Tag Archives: Tech

How to Be a Good Tech Influencer Fan – Jumpstart Your Rise to Social Stardom

Can anyone really begrudge the tech influencer groupie? It’s a small subset of the population that lives, breathes and adamantly follows the inside baseball goings-on in the world of IoT, IIoT, AI, ML, BI, OPM, APM and a host of other technological acronyms… While the numbers are few, make no mistake, the role is important.

Analysts, tech writers and contributors, serial entrepreneurs and venture capitalists are the highly esteemed and well-revered keepers of the keys to what the future will hold for us all, and hence naturals for the influence role. They know what the “next big thing” is. They’re aware of the marketing trends and commercial needs. They know how to decipher technical jargon and set aside the trending buzz terms to drill into what truly matters – and what will have the biggest impact.

Below are a few tips for building relationships that work with and for influencers:

Before you dive in, take some time to think about what kind of influencers are aligned with your market and business goals. Are you looking to gain insights for propelling your business forward from serial entrepreneurs? Are you seeking a better understanding of who your competition is in the marketplace? Do you want to generate stimulating conversations that will encourage influencers’ followers to notice you and start following what you’re doing? Are you hoping to parlay online social engagements into real-life media interview opportunities or analyst briefings? Do you want to build social status and influence (which can be “counted” with tools like BrandWatch and FollowerWonk based on levels of engagement, caliber of followers and more)? Do you want to collaborate on research projects? Gain access into professional communities or insight into new market research reports and papers? The list is a mile long and then some. Stop and think about what you want. Start small and focused and go forth from there.

Here at 10Fold, we regularly track, follow, and strategically engage with influencers on social media on behalf of our clients. That’s something that tends to be best to leave to the professionals, as engaging with the wrong contact in the wrong way at the wrong time could be disastrous for your reputation and lead to more closed doors than open opportunities. This starts with the all-powerful strategic search. We deploy social media listening tools to determine which influencers have a strong social authority (with algorithms that track engagement, follower numbers, social status of the influencers’ followers, growth and more) and couple that with an acute understanding of which tech influencers are actively writing, talking, researching, publishing, speaking and pontificating about niche areas of market movements in various facets of the tech industry.

Once you’ve solidified your list and as you start to track influencers, look around at their omnichannel online and offline footprints to determine how best to follow and engage with them. See where they’re speaking and what live industry events they are the most excited about attending. Keep an eye out for mentions of colleagues also playing in the space, as well as industry forums, groups and communities in which they are active players. Understand what they are passionate and what makes them tick. Join any TweetChats or LinkedIn Groups they are actively involved in. Check out guest blog posts, contributed articles, interviews, podcasts, videos, websites and any other avenues for which these target influencers are actively contributing, posting or sharing.

Listen!
Understand their pet peeves, likes and dislikes. Read their tweets and posts. Favorite them to show your support. Share or retweet them if you like the content. Comment with thoughtful responses to further the conversation, as well as engaging (non-self-serving) questions to take a deeper dive into topics of interest. If they are encouraging feedback, share your personal (professional) experiences with the topic they’re speaking about – you never know, they just may want to connect further to learn more from you for a future story, paper of post. We use social media monitoring tools to help track this and flag opportunities for engagement for our clients. Find the cadence and listening structure that is right for you and fits within your schedule. (Be forewarned, this in and of itself can be a full-time job!)

Engage
The last stop on your rise to becoming a social media guru yourself will be in learning the nuanced and unspoken terms of engagement in the right place, with the right influencers, at the right time, with the right content. Once you’ve mastered this, by sharing your owned, original content frequently (but not too overtly) and sharing others’ content (with the right cadence and the right audiences), you’ll start gaining traction and will eventually earn your stripes with influencers who will start to tag and mention you. At that point, you may want to think about hiring an influencer to help boost awareness of your company. Stepping into a paid social campaign is a whole other ball game, which calls for another conversation, on another blog post at another time. (Luckily for you, we’ve already prepared the initial stepping stones there for you!) Visit our post on how to get started with paid campaigns here.

By Katie LeChase 

Don’t forget to subscribe to our newsletter to get our content and other updates straight to your email as soon as it’s posted!

Security Never Sleeps 2018 – Buyers and Sellers Face to Face

10Fold hosted our eighth annual Security Never Sleeps event during the 2018 North American RSA trade show yesterday. The event is conveniently located within walking distance of the Moscone Center at the Red Dog Café in San Francisco. Building on the success of the events previous years, the luncheon had more than 90 attendees made of up CISOs, security architects, venture capitalists, and security vendors participating in the cybersecurity discussion. The conversation facilitated a dialogue between Security vendors and buyers, enabling a marketplace of ideas that helped all attendees perfect their communication strategies.

Panelists at the event included:
NO FOLD ICON 15x15 Carl Wright – CRO at AttackIQ – a continuous validation provider for enterprise security programs.
NO FOLD ICON 15x15 Kathy Orner – Chief Risk Officer at Carlson Wagonlit Travel, a business travel and management firm dealing with events, meeting accommodations and more.
NO FOLD ICON 15x15 Mike Kearn – BISO at Consumer Banking Division of US Bank, responsible for the security of checking and savings accounts, mortgages, and more.
NO FOLD ICON 15x15 Peter Galvin – CMO at Thales, a France-based multinational that supplies electrical systems and services to aerospace and defense industries.
NO FOLD ICON 15x15 Rich Campagna – CMO at Bitglass, a Next-Gen CASB provider for Zero-Day data and threat protection.
NO FOLD ICON 15x15 Dr. John D. Johnson – CEO and Founder Aligned Security, LLC, Which develops and delivers of targeted security training .

The event also saw attendance from many high-profile players in the security space, including Chad Sweet (Founder and CEO of the Chertoff Group), Shira Rubinoff (President of Secure my Social), Chenxi Wang (Managing Partner of Rain Capital) and many more!

The panel covered some of the biggest topics covering marketing and selling security products in the industry today. This included registration for content barriers, making your products accessible to buyers, the importance of building customer relationships, and the efficacy of alternative marketing efforts – such as video marketing and email marketing.

The audience was very active this year and led the discussion into many trends and how they relate to security today. GDPR was certainly a popular moment of debate, as the upcoming deadline (May 25th) is fast approaching, and means more than meets the eye for vendors, buyers, and even marketers!

Sad you missed all the valuable insights from this year’s event? Never want to miss one again? Get notified when we have and recap all the other awesome events we attend and sponsor, and have consistent B2B marketing content sent to your inbox by subscribing below!

By Tyler Trainer

When Everything at RSA is Over the Top, How Can I Stand Out?

If you’ve ever been to RSA, you know it can be a mind-numbing experience. So many booths with so much noise and activity while everyone clamors for attention. As seasoned veterans of this show, security clients often ask us:

“When everything at that show is so over the top, how can we stand out?”

After walking and studying the show floor at seven RSA shows, I’d like to share a few things I’ve seen and that stick out in my mind in a positive way… and a couple of things to be wary of. What follows below are my top 10 things vendors can do to stand out at RSA.

Do something different at your booth… and no, that does not mean “booth babes” (Bo-Ring).
To give you a sense of the possibilities, last year two of the cleverest booth attractions included Nyotron’s Daniel Craig impersonator (doing his best James Bond spiel as he talked about the company’s technology) and TrapX’s body painter, who painted a woman against a TrapX backdrop so that she completely disappeared into the background. Both of those booths attracted hordes of people. In Nyotron’s case, exhibit event reps—on a number of occasions—had to tell them to thin their crowd out because they were blocking the flow of traffic.

Use a prop.
At one RSA, an up-and-coming security vendor built a demolition booth that had a bunch of antiquated firewalls from a number of well-established security companies. They then gave people a hard hat, safety goggles, and a sledge hammer, then invited them to go to town on the appliances. There’s just nothing more satisfying than taking your frustrations out on a bunch of broken electronics. One year another security company had a Formula One racing car on the floor. The vendor let people climb into the front seat and take photos. To build on the prop idea, you could offer a company T-shirt if people take a selfie with your prop and share it on Twitter with specific trending hashtags.

Plan ahead and try to get a speaking slot.
Getting a speaking slot at RSA is hard… but not impossible. It helps if your security company has a threat research arm that’s able to uncover new/unique threat data. For example, how a new piece of malware works in the wild. Once you’ve secured a slot, announce the win through a press release a couple of weeks before the show and socialize the heck out it in the run-up to the show and during the show. Do a live Tweet session during the actual presentation.

Look alive!
Enforce a two-drink maximum per employee per night. Nothing looks sadder than a booth full of security execs who are milling about nursing hangovers (yes, we can tell!). And it’s usually reflected by the fact that none of the people in the booth is making eye contact with anyone, and, as a result, their booth is practically empty.

Have some snacks/drinks at the booth for reporters.
Tons of reporters attend RSA, and they are on their feet all day walking the halls going to and from meetings. Quick note: reporters are always distinguished by a badge that’s a different color than regular conference attendees—know what that badge color is before the show starts and make sure everyone in the booth is on the lookout. Offer a monetary bonus to any staffer who draws a reporter into the booth to listen to your spiel. One way to lure them in when you see one coming towards you is to offer them some nourishment. Have some cold drinks on hand and some snacks you can offer up. The quickest way to a reporter’s heart is through their stomach.

Make sure everyone in the booth knows your product.
Make sure they’re prepared to answer high-level questions about your product. I can’t tell you the number of times I’ve stopped at a security booth and asked someone standing by a kiosk how their product works only to be told they have to go find someone to explain it to me. At that point, I’m gone.

Don’t forget to promote your appearance at the show in advance of the show.
Part of RSA includes the buildup to RSA. Issue a press release two weeks before the show that says you’re going to be there and what you’re going to be showing off. A week before the show, issue another press release that highlights any other activities you have planned, such as any special guests you have coming by, times you’ll be doing special giveaways at the booth. Also, suggest that people send out specific tweets with relevant hashtags for a chance to win a great prize at the show.

Hire a special guest to stop by.
I’ve seen Scott Adams (Dilbert fame) and Kevin Mitnik (hacker fame) signing books at booths, and they’ve had lines a mile long.

Make sure your booth signage tells your potential customer who you are and what you do.
You might think your name and logo is known around the world, but you’d be surprised – with so many security companies in one place, it’s easy to get confused as to who there does what.

Last, but not least, produce some short videos highlighting key execs and customers.
There’s something about video that draws the viewer’s eyes in. If you believe a picture is worth a thousand words, then imagine how many a video is worth!

A couple extra tips.
If you have some real news you want to announce at the show, like the discovery of a brand new Zero Day or some other significant compromise, think about pre-briefing the media and breaking the news in the leadup to RSA. The competition for news headlines will be fierce at the show. How fierce? Here’s a link to a list of this year’s exhibitors that you’ll be competing against.

And whatever you do, DON’T give away flash drives at your booth. At one RSA, I walked by a VERY prominent security company’s booth and a couple of booth models-for-hire were handing out flash drives with the company’s logo on it to everyone walking by. I took one, walked a few steps, decided I didn’t need another flash drive for my junk drawer, turned around and gave the drive back to one of the models. She took it and dropped it back into her basket to hand out to the next unwitting conference attendee walking by. Anyone who knows ANYTHING about security knows how easy it is to load executable malware onto a flash drive. Can you imagine the PR nightmare someone could cause by taking a bunch of these drives, loading them up with malware and giving them back to the person handing them out only to reissue them to other attendees?

By Rick Popko

Need more great insights? Check out some of our other content here, and subscribe to our email list below:

Reaching the High Bar: What Business Press Want From Their Sources

Placement in business press is the gold standard by which your PR efforts are measured. Publications like Forbes, Fortune, Wall Street Journal and others represent a high bar because of their prestige, influence and broad reach. When our clients get a feature in Bloomberg or New York times, it’s usually framed and hung in the office foyer or otherwise worthy of front and center placement on the home page of the company web site.

However, for most clients — especially smaller start-ups – it seems that business press is all but out of reach for anyone not included on the Fortune 500. And there’s a grain of truth to that. For one, unless your name is Amazon, Google, Apple, Microsoft, Facebook or the like, there’s little chance that business press will cover any straight product announcements. Meanwhile, business publications – congruent with the media industry in general – are dealing with shrinking staffs that have little time to address the hundreds of pitches they see in their inboxes on a daily basis.

For many of the same reasons, funding coverage – once eagerly sought by business press reporters – is also diminishing. For the last several years, VCs have invested liberally in the start-up community, and as a result, many funding announcements are often deprioritized or ignored altogether by reporters. And while VCs have only recently started to pull back, reporters now seldom cover announcements less than $25M.

So what are business press reporters actually looking for?

They’re looking to tell a story.
A company and/or product by themselves are not interesting. But when placed in the context of a broader trend or story, stand-alone products have the potential garner attention from even the most scrutinizing tier one reporters. When crafting the announcement, ask yourself, what does this mean for the industry? Customers? Is this part an ongoing or more significant story that is unfolding? Could this be a catalyst for change? The release of a cloud storage platform, for example, might actually capture their attention when put in the context of a story on how niche life science firms are adjusting to both storing significantly more data and adhering to new compliance regulations aimed at protecting it. Viewing your story from the lens of a reporter will give you the ability to pre-emptively address their objections while also crafting a narrative that they’ll actually want to write.

They’re looking for simple explanations.
Business press are catering to a broad audience, with the majority of their readers in the business community. While readership may include some technology experts, most will only have a laymen’s understanding of technology industry concepts. Therefore, don’t assume the reporter knows as much as you do about your subject (chances are they don’t). Provide simple and clear narratives, with minimal use of industry jargon. Queue up an elevator pitch that can easily illustrate what your company does in one to two sentences. Break down explanations – even if the journalist has the press release or you think they’re familiar with the topic (simplified explanations will often make the best quotes.) And during the interview, do provide the reporter real-world examples or scenarios that allow them to “see” what you’re explaining. This could be a description of how a security threat halts operations of critical infrastructure that your solution can remediate, or depiction of video systems for sporting events that generate petabytes of data to be stored and secured by your platform. Bolstering your assertions with these kinds of descriptions will ultimately help reporters understand how your product or service will affect the lives of their readers.

They’re looking to build a relationship.
Business press reporters are bombarded with hundreds of pitches every day – the vast majority of which end up deleted because the PR professionals failed to do their due diligence ahead of time. Most pitches are untargeted and blasted out to hundreds of journalists all at once, with little knowledge about, or relevance to, the reporter’s audience. Instead, take the time to get to know a reporter by regularly reading and commenting on their stories, following them on Twitter and LinkedIn, and connecting at tradeshows and events (that’s where 10Fold shines). This up-front investment will soon pay off, even if a story isn’t generated from every interaction. By keeping up this steady cadence, reporters will eventually trust you enough to come to you for a comment or with a story idea. And those relationships are the ones that will last.

By Stefanie Hoffman 

Looking for more great insights? Check out some of our other content here, and subscribe to our email list below:

3 Best Practices for B2B Social Media

Are you like so many others who have had trouble succeeding in the social media realm? We all know that social media marketing is a must-have component in any communications strategy, but without a game plan to drive growth and engagement you are unlikely to succeed. Social media strategy is incredibly important to keep your profile front and center in your prospects’ view and in reaffirming your expertise with current customers.

Platforms
Facebook, Twitter and LinkedIn should be your primary platforms in distributing content, getting your message across, and building relationships with followers. These three have been found to be the most used social sites by B2B firms, and this is where you will need to be the most competitive and most active.

Frequency and Timing
You should aim to post at least once every week day, and don’t forget weekend’s if you see that’s when your followers (or would be followers) are most active. Posts for Facebook, Twitter and LinkedIn for any one day do not have to be different articles. It’s fine to use one article across all social platforms per day, but do take the time to customize your actual posts – each platform has a slightly different style and of course, length for content. This will allow you to maintain your clout in your follower’s feed when they tend to be most active.

FollowerWonk offers many services, including graphs of follower data.

So how do you find out when to post for the biggest impact on growing your social profile and influence? There are many third-party applications available that are both free and paid that allow for in-depth analysis of your follower activity across different social platforms. Buffer has put together a comprehensive list of many of these applications here.

RELATED: Content Is Still the King!

Content
Social content should not just be all about you. Try to keep self-promotional content to about two days per week, or no more than around 25 per cent of your posts. This can be promoting your company’s product or services, or a particular section of your website. Posts about you at an industry event, depending how you craft them, can fit under industry news.

Thought leadership posts are another way to establish credibility and authority over the issues that your clients or prospects care about. While still self-promotional, showcasing your or your firms expertise in a niche industry or subject demonstrates proficiency in your services and give a sense of authenticity to your target audience.

Industry news articles, especially when you add commentary versus a simple retweet, share or like, should be the majority of the social content that you post. Try to keep up with trending topics and news coverage so your posts are “fresh” and relevant – basically no more than about one week old. This will allow you to stay on top of current events and move with the news cycle to maximize the attention your posts receive.

Stay tuned for more of these B2B think pieces, including information on video marketing, content curation, and much more!

Gain some good insights from this piece? Check out some of our other content here.

Contributions from Fran Lowe.

Balbix: Predicting Data-Breaches Before They Happen

WannaCry and Petya are the names of two particularly damaging types of ransomware. Ransomware is a type of malware that infects computer systems, encrypts the data on those systems and doesn’t relinquish it until a ransom is paid. My fellow 10Fold colleague Kory Buckley recently wrote a blog on the topic.

Many of the organizations that were affected with these latest ransomware versions had adequate network security measures in place, including firewalls and antivirus, but the attack still managed get though most defenses. Much of that has to do with how the security stack around endpoint protection is configured. Balbix, a San Jose, CA-based network security company believes they have developed an innovative solution that will help organizations better protect potential endpoint vulnerabilities. And they’re doing it using advances in artificial intelligences (AI).

On June 6, Balbix emerged from stealth with the industry’s first predictive breach-risk platform that is able to predict and prevent an attack before it happens.Balbix was founded by Gaurav Banga, former CEO of Bromium, with the mission to measure risk and give enterprises the confidence they need with increasing their cyber-resilience.

In addition to launching their security platform, the company announced $8.6 million in investor funding from Mayfield.

How does Balbix work?

Balbix has built the market’s first platform to use predictive analytics and Artificial Intelligence to automatically measure breach risk and calculate resilience. Balbix also uses specialized sensors across the enterprise to continuously discover and monitor all devices, apps and users across hundreds of potential attack vectors. These sensors allow security teams to visualize their breach risk and quickly prioritize operations and projects.

The Balbix’s platform features:

  1. Comprehensive risk heat-map: Balbix has created a system that automatically monitors and analyzes the enterprise network 24/7/365 across hundreds of attack vectors. This helps overburdened security teams prioritize mitigation projects by identifying areas of highest risk and surfacing actionable insights.
  2. Predictive risk analytics: Balbix predicts breach scenarios by analyzing indicators of risk, factors that point to the future likelihood of occurrence of security incidents, e.g., user clickthrough behavior indicating high phishing risk. In contrast, existing products rely on indicators of attack or compromise based on security events that have already happened.
  3. Effectiveness of mitigations and cyber-resilience: Balbix can compute the effectiveness of security mitigations already implemented and help prioritize planned security projects. The system also measures organizations’ cyber-resilience – the ability to limit the impact of security incidents.

In a recent eSecurity Planet article, Balbix founder and CEO, Gaurav Banga said, “AI and automation offer two key advantage in security: they’re very good at dealing with large vectors of data across hundreds of dimensions, and they provide the ability to understand and report the level of confidence in any conclusions reached in order to avoid false positives. Because of these two advantages, AI, when correctly implemented, can provide super-powers to cyber defenders, who now have the ability to come to the best conclusions given large amounts of fuzzy security data from their operating environment.”

In my eyes, Balbix is a network security company to watch. But don’t just take my word for it, read a few of the following stories to see what the media are saying about the company.

  1. eSecurity Planet
  2. eWeek
  3. Dark Reading
  4. SiliconTap
  5. Beta News
  6. FinSMEs
  7. Silicon Angle
  8. VMBlog
  9. SDxCentral
  10. IT Pro Portal
  11. FOX News
  12. IT Business Edge
  13. Channel Partners
  14. Virtual Strategy Magazine

Enjoy your read? Check out our other content here.

Howdy ya’ll! Greetings From Austin, Texas…

What are we doing in the Lone Star State, you ask? Well, we’re excited to officially announce the opening of our newest 10Fold office! That’s right, we’ve expanded our footprint (or cowboy boot print, we should say) beyond California to Austin, where you can find us located in the heart of downtown at the corner of 6th Street and Congress Avenue, just steps from the Texas State Capitol (map here).

There are many things that attracted us to Austin, primarily the booming local tech scene, coupled with an extremely talented pool of PR professionals. Oh, and of course the amazing BBQ, craft beers, incredible live music, endless sunshine, beautiful Texas wildflowers, etc. are all added bonuses!

We invite you to keep an eye on our blog, as our Austin team will be sharing updates regularly on the agency’s growth, local market trends, the latest hotspots, etc.

We could not be more enthused about the prospect of Austin. If you’re a University of Texas student looking for a summer or fall internship, a PR practicioner exploring your next career opportunity, or an emerging technology company in need of PR and marketing services, we’d love to have a conversation!

Feel free to reach out to us by visting our contact us page.

Network Breaches Are No Match for Veriflow

Based in San Jose, California, Veriflow provides a preventative solution for network administrators who worry about security vulnerabilities from change induced errors. The practical application of this service allows for network administrators who may not be knowledgeable in certain technologies to easily monitor changes in the network. Where Veriflow differs from its peers is the basis of its design; a mathematical formula called formal verification, which continuously evaluates changes and ensures they won’t bring harm to the network.

President and CEO James Brear is a proven industry executive with an impressive history of success. Annual revenues under James rose consistently with his leadership at Procera Networks, totaling nearly 1110% in total growth from the start of his tenure and gathering several awards. This led to the successful acquisition of the firm by Francisco Partners for $240M in 2015. Co-Founder Brighten Godfrey leads the technical research and development for the firm. He holds a Ph.D in computer science and is an expert in mathematical formal verification, which checks the validity of code as it is written.

Veriflow has been awarded several accolades for its unique services, including Innovation Challenge Winner and a silver medal from the Network Products Guide. The firm has also been able to attract investments from the Department of Defense, Menlo Venture Capital, and NEA Technologies.

For more information about Veriflow and their services browse through coverage 10Fold has helped them acquire here and here, and watch how Veriflow’s products work here:

Meet the Data Integration Leader SnapLogic

Headquartered in San Mateo, California, SnapLogic is a unified application and data integration platform service. Pre-built data integration greatly simplifies solving complex problems based on data of several different formats. Built for the modernized data center, SnapLogic supports cloud and big data architecture allowing customers to solve their problems faster and with greater efficiency. Guarav Dhillon, who began as an early investor in SnapLogic, has led the firm since 2009 as CEO after realizing its potential. Before SnapLogic, Dhillon co-founded and led software enterprise Informatica, overseeing its rapid expansion during his role as CEO and creating billions of dollars’ worth of value for stockholders and customers.

SnapLogic has a range of high profile customers due to their innovative business approach, including Verizon, Adobe, CapitalOne, GameStop, and AstraZeneca. A host of impressive accolades have also been placed on the firm since their inception, among them being 2016 Stratus Awards for Cloud Computing Honors Companies Worldwide, 2016 Gold and Silver Winner of Stevie American Business Awards, DBTA 2016 100- The Companies that Matter Most in Big Data to name just a few.

Find recent coverage of SnapLogic here and here, and learn more about the product and services SnapLogic provides in this video:

 

10Fold- Security Never Sleeps- 104

Following Snowden’s Legacy, Contractor Accused of Stealing NSA Files

“Political motivations still unknown”

Stock prices of NSA contractor Booz Allen Hamilton took a nosedive Friday as reports of one of its contractors leaked that a former employee had been charged with two felony accounts of theft of government property and unauthorized removal of classified documents by the Department of Justice. The accused, Harold Martin Thomas III, faces up to 11 years in jail for his alleged crimes. Booz Allen also bears the weight of the formerly employing the highly controversial Edward Snowden, whose leaks to the public in 2013 revealed a mass United States surveillance program.

Expose Retaliation for BuzzFeed

“Retaliation for defamation articles against hacker group OurMine”

Interactive media site BuzzFeed was compromised Thursday by hacker group OurMine, bringing down articles and deleting information related to their members. The massive cyberattack came after BuzzFeed published stories that OurMine, which focuses primarily on the digital accounts of tech CEO’s, venture capitalists and celebrities, may be a lone Saudi Arabian teenager.

Mac Malware Monitor Your Webcam, Microphone

“New malware can penetrate even airtight Mac devices”

Malicious software that targets user’s microphone and webcam access is nothing knew, the NSA and cybercriminals alike have had programs for years that are capable of such feats. However, Mac devices have largely been a different, due primarily to the hardwired light indicating that webcams or microphones are active allowing users to notice their activation. This perceived safety may no longer be the case, according to researcher Patrick Wardle, His team’s analysis at Synack has examined several examples of malware being able to monitor microphone and webcam feeds without activating this light.

eCommerce Sites Lose Customer Data to Web Malware

“MageCart responsible for several incidents”

Cybercriminal campaign ‘MageCart’ has been the culprit of several hacking events involved with the loss of customer data and other sensitive information. MageCart has been active since at least March of this year, targeting other sites such as Powerfront and OpenCart.