risk

Viewability of Directly Placed Display Ads Improves in H1

source: http://www.marketingcharts.com/wp/direct/viewability-of-directly-placed-display-ads-improves-in-h1-36622/?utm_campaign=rssfeed&utm_source=mc&utm_medium=textlink

Advertisement

Longer engagement with viewers was much harder to come by: just 31% of directly placed ads remained in-view for 15 seconds, although that was a significant rise from 22.7% in the previous 6-month period.

Details from Integral’s “Semiannual Review” indicate that viewability continues to be better for vertically oriented (160×600 – Skyscraper) ads, with an average of 67% in-view for at least 1 second.

Suspicious Activity Lowest for Directly-Placed Ads

Directly placed ads not only had the highest engagement, they also were deemed to be lowest risk. While more than 1 in 5 impressions overall were suspicious of being fraudulent activity, only 2% of those placed directly exhibited suspicious activity. By contrast, exchanges were far riskier, with 20% of impressions deemed questionable (though that was down from upwards of 30% in H2 2012).

While the Integral study suggest some improvements in fraudulent activity, a recent report from Solve Media indicated that levels of suspicious activity continue to rise. Solve Media also pointed to rising fraud within the video ad space: in its study, Integral reveals that 3% of impressions on pre-roll ads were suspicious, with suspicious activity more concentrated on in-banner video ads. In fact, 40% of impressions through exchanges on in-banner video a! ds were e! stimated to be suspicious, according to the report.

Other Findings:

  • Food sites boasted the highest level of engagement, with an average in-view time of more than 2.1 seconds. Education sites fared worst on this level, with an average in-view time of about 1 second.
  • Ads on shopping sites were again deemed the least risky in terms of suspicious activity, while family and health sites had the highest rates of suspicious activity.
  • The overall proportion of high-risk inventory (impressions that represent a low degree of brand safety) stood at roughly 6% in Q2, and was relatively consistent across channels.
  • Risk content continues to be mostly the realm of illegal downloads, drugs, offensive language and alcohol. Risky adult and hate speech inventory declined between Q1 and Q2.
  • About 13% of ads collided with another ad from the same campaign during H1, down from more than 20% in H2 2012.
  • Canada received the largest amount of the US’ non-geo-targeted content, at 16.4% in Q1 2013 and 15.8% in Q2. Both were improvements from 34.5% in Q4 2012.

Tags: , , , , , , , , , , , , , ,

Sunday, September 15th, 2013 news No Comments

drag2share: Security Researchers Prove That Dropbox Can Be Hacked

source: http://feedproxy.google.com/~r/businessinsider/~3/bsh7YBL3bks/researchers-prove-dropbox-can-be-hacked-2013-8

Drew Houston

Two security researchers blew by Dropbox’s security features, gained access to private user files and published a paper that explained how they did it.

Their goal was to get Dropbox to create an open source version of itself, which means that anyone could look at its code and verify that the service is secure.

“Dropbox will/should no longer be a black box,” the researchers, Dhiru Kholia of Openwall and Przemysław Wegrzyn of CodePainters, wrote in their research paper.

There’s a few interesting things about this Dropbox take-down. One is that, after Dropbox was hacked about a year ago, it added security features to protect users and make Dropbox more appealing to paying customers like enterprises.

For instance, it added encryption and something called “two-factor authentication” which makes users take extra steps to log into a Dropbox account.

The researchers disabled both of those protections.

More importantly, they “reverse engineered” the portion of Dropbox that runs on a user’s computer. That means they looked at Dropbox’s programming code. They shouldn’t have been able to do that. Dropbox was written in Python using techniques that prevent reverse engineering.

There are a lot of cloud services using Python and these same techniques. This means they a! ll could be at risk.

Ultimately, the researchers want to make Dropbox safer. They are hoping others will help them build a secure, open source method for using Dropbox. This would be freely available for Dropbox to adopt, if it wanted to.

Dropbox says that this research doesn’t really put anyone’s accounts at risk. A spokesperson gave us this statement:

“We appreciate the contributions of these researchers and everyone who helps keep Dropbox safe. However, we believe this research does not present a vulnerability in the Dropbox client. In the case outlined here, the user’s computer would first need to have been compromised in such a way that it would leave the entire computer, not just the user’s Dropbox, open to attacks across the board.”


drag2share – drag and drop RSS news items on your email contacts to share (click SEE DEMO)

Tags: , , , , , , , , , , , , , , , , ,

Thursday, August 29th, 2013 news No Comments

Finally, an App That Saves Your Snapchats Without Telling the Sender

Source: http://gizmodo.com/finally-an-app-that-saves-your-snapchats-without-telli-1077761310

Finally, an App That Saves Your Snapchats Without Telling the Sender

Snapchat really broke the mold with this whole single-serve messaging feature. Send a friend a sexy pic without the risk of anybody else seeing it? What genius! Of course some enterprising app developer was going to come along and ruin it.

 

Tags: , , , ,

Friday, August 9th, 2013 news No Comments

drag2share: Movie Studios Are Setting Themselves Up For Huge Losses

source: http://feedproxy.google.com/~r/businessinsider/~3/YfoamdyaVmU/hollywoods-huge-movie-budgets-2013-3

Here’s a look at some of the biggest film budgets of the past three years and the differences in how they fared opening weekend:movie studio gambles

As you can see, sometimes the risk pays off. “The Avengers” and “The Dark Knight Rises” grossed more than $2.5 billion combined.

So far this year, seven films are estimated to have larger-than-life budgets:

movie budgets


drag2share – drag and drop RSS news items on your email contacts to share (click SEE DEMO)

Tags: , , , , , , , , , , , ,

Wednesday, March 6th, 2013 news No Comments

How Crypto Keys Can Be Stolen Across the Cloud

Source: http://gizmodo.com/5958778/how-crypto-keys-can-be-stolen-across-the-cloud

How Crypto Keys Can Be Stolen Across the CloudMost people are happy to give their neighbours a spare house key in case of emergencies, but you probably wouldn’t want to give them your digital passwords. Now security researchers have shown that you may not have a choice, at least when it comes to cloud computing.

Cloud servers let users run simulations of an ordinary computer, called virtual machines (VMs), on remote hardware. A VM performs exactly as an ordinary computer would, but because it is entirely software-based, many of them can run on a single hardware base. Yinqian Zhang of the University of North Carolina, Chapel Hill, and colleagues have discovered that it is possible for one VM to steal cryptographic keys – used to keep your data secure – from another running on the same physical hardware, potentially putting cloud-computing users at risk.

The attack exploits the fact that both VMs share the same hardware cache, a memory component that stores data for use by the computer’s processor. The attacking VM fills the cache in such a way that the target VM, which is processing a cryptographic key, is likely to overwrite some of the attacker’s data. By looking at which parts of the cache are changed, the attacking VM can learn something about the key in use.

Zhang and team did not test the attack in the cloud for real, but used hardware similar to that employed by Amazon’s cloud service to try stealing a decryption key. They were able to reconstruct a 4096-bit key in just a few hours, as reported in a paper presented at the Computer and Communications Security conference in Raleigh, North Carolina, last month.

This attack won’t apply in all situations, as an attacker would have to establish a VM on the same hardware as yours, which isn’t always possible. What’s more, an attack would not work on hardware running more than two VMs. Still, those looking to use cloud services for high-security applications may want to reconsider.

Image by David Malan/Getty


How Crypto Keys Can Be Stolen Across the CloudNew Scientist reports, explores and interprets the results of human endeavour set in the context of society and culture, providing comprehensive coverage of science and technology news.

Tags: , , , , , , , , , , , , , , , , , , ,

Thursday, November 8th, 2012 news No Comments

Facebook opens mobile ads for apps to all developers, keeps them on the money train

Source: http://www.engadget.com/2012/10/17/facebook-opens-mobile-ads-for-apps-to-all-developers/

Facebook opens mobile ads for apps to all developers, keeps them on the money train

It’s no secret that Facebook saw FarmVille for iOS as writing on the wall: it had to either tap into mobile app revenue or risk losing income (and marketing-savvy developers) whenever someone left the web. Following a beta this summer, the company’s solution to its dilemma is now open to everyone. All developers on the social network can build ads that link from Facebook’s Android and iOS apps to either Google Play or the App Store — offering both an easy plug for their native apps and that all-important ad revenue for Facebook. The system currently takes a shotgun approach and may pitch social networkers for apps they already have or don’t want, but it should be refined in the next few months to where some curious purchasers won’t even have to leave Facebook to load that hot new title. Hopefully the increased recognition for mobile developers is worth sullying our once pristine news feeds.

Filed under: , , ,

Facebook opens mobile ads for apps to all developers, keeps them on the money train originally appeared on Engad get on Wed, 17 Oct 2012 23:20:00 EDT. Please see our terms for use of feeds.

Permalink CNET  |  sourceFacebook Developers  | Email this | Comments

Tags: , , , , , , , , , , , , , , , , , ,

Thursday, October 18th, 2012 news No Comments

Source: http://gizmodo.com/5942118/ipads-to-replace-paper-reference-manuals-in-all-aa-cockpits

iPads to Replace Paper Reference Manuals in All AA Cockpits

The FAA has approved American Airlines to be the first commercial airline to have its pilots use iPads in “all phases of flight,” rather than the 35lb paper reference manuals they’re used to.

Based on current fuel prices, The Next Web estimates that this will save the airline some $1.2M annually, across all of its aircraft. This month, AA’s 777 fleet will be the first to get the technological upgrade; by the end of this year, all fleet types are expected to have approval for the switch and the paper manuals will cease to be revised.

This is a huge environmentally friendly move for AA: not only will the ligher tablets save fuel, based on the weight carried by the planes, but they will also save paper, for ever manual printed and revised, company-wide.

This would also seem to confirm what we’ve all long suspected: there is really no real risk to having a tablet turned on during take-off. [TNW]

Images by Nickolay Lamm/Inventhelp

Tags: , , , , , , , , , , , , , , , , , ,

Tuesday, September 11th, 2012 Uncategorized No Comments

Facebook Stock Crash Hoses California’s Tax Revenue

Source: http://www.businessinsider.com/facebook-stock-crash-hoses-californias-tax-revenue-2012-8

california foreclosure map

Well, the hits from the Facebook stock implosion keep coming.

Now, it’s the State of California, which apparently overestimated how much tax revenue it was going to collect from Facebook employees after the IPO.

According to Bloomberg’s John Erlichman, California is now saying its “tax revenue is at risk” because it assumed it would get $1.9 billion from newly enriched Facebook employees.

But now those Facebook employees are only going to get about half as rich as they would have if the stock were still trading at the IPO price.

And that means that California–and the Federal government–are likely to collect only about half as much Facebook-related tax revenue as they thought.

SEE ALSO: No, Facebook Is Not Valued At $40 Billion–Google And Yahoo Finance Are Wrong

Please follow SAI on Twitter and Facebook.

Join the conversation about this story »

Tags: , , , , , , , , , , , , , , , , , , ,

Thursday, August 2nd, 2012 news No Comments

The PC Market Is In A Stall

Source: https://intelligence.businessinsider.com/welcome

After decades of sustained growth in the PC market (with the exception of 2001), growth is slowing to a halt. Overall PC shipments grew 4 percent last year, down from 14 percent the year before, and the lowest growth rate since 2001.

There are a few reasons for this. The global economy has been choppy since the downturn of 2008, depressing both business and consumer spending. The business PC upgrade cycle has gotten longer — Microsoft says that about two-thirds of all businesses are still using Windows Vista (which is more than five years old) or Windows XP (almost 11 years old). The introduction of the iPad in spring 2010 sucked the air out of the market for cheap tiny laptops called “netbooks,” which had been driving a lot of PC growth for the previous few years.

The release of Windows 8 later this year may drive a new wave of consumer adoption, although there’s a real risk that many consumers will find the huge design changes confusing and stick with Windows 7 or switch to Apple products instead. After that, the end of life for Windows XP in April 2014 could spur a big business upgrade cycle.

But for now, the PC market looks flat and mature.

Global PC Shipments By Manufacturer

Please follow BI Intelligence on Twitter.

Join the conversation about this story »

Tags: , , , , , , , , , , , , , , , , , ,

Monday, June 11th, 2012 news No Comments

Every Major Credit Card is Potentially Hacked

Source: http://gizmodo.com/5897872/every-major-credit-card-is-potentially-hacked-right-now

Every Major Credit Card Provider Is Potentially Hacked Right NowGlobal Payments, a major credit card processing company, has reportedly been hacked. That means each of the four major credit card companies, and according to reports, as many as 10 million customers are at risk.

The story has been developing throughout the morning. Right now, it goes like this: Hackers gained access to an administrative-privileged account at a New York City taxi company and, over the course of several months, stole 10 million credit card numbers. They’ve been sitting on them, waiting to spend all at once to maximize the time before they’re shut down.

The Wall Street Journal puts the number of compromised accounts around 50,000, which is a far cry from 10 million. The massive number had originally been sourced to a post from a Gartner analyst, and while it seems a little far fetched that a cab company would have millions of numbers, we’d still err to caution.

Visa and Mastercard have both issued statements explaining the breach, but stressed that their networks were not specifically breached. Though that doesn’t really matter if you’re affected by the hack of “third-party processor” Global Payments. No word yet from American Express or Discover, but both are accepted by official NYC cabs.

Third-party processors like Global Payments or PayPal simplify accepting credit cards for small or spread out merchants. So a cab using GP is about the same as an eBay seller using PayPal, and this hack affects users the same way a PayPal hack would. Which is to say, very seriously.

Everyone seems to be scrambling to figure out what’s going on here, including credit card companies. What we’re going on right now is that this is probably based out of New York, and probably confined to those who’ve paid for a cab with a credit card. If you fit that description, think about preemptively checking in with your card company to protect yourself. [Gartner, PhysOrg, CNN, WSJ]

Update: Bank of America and Chase have apparently been alerting their customers about this breach for weeks, but not providing specifics beyond their individual accounts. And in some cases, alerted customers received fraudulent charges even after a card had supposedly been shut down.

Thanks Lauren & iomegaman5

Tags: , , , , , , , , , , , , , , , , , , ,

Friday, March 30th, 2012 news No Comments

Dr. Augustine Fou is Digital Consigliere to marketing executives, advising them on digital strategy and Unified Marketing(tm). Dr Fou has over 17 years of in-the-trenches, hands-on experience, which enables him to provide objective, in-depth assessments of their current marketing programs and recommendations for improving business impact and ROI using digital insights.

Augustine Fou portrait
http://twitter.com/acfou
Send Tips: tips@go-digital.net
Digital Strategy Consulting
Dr. Augustine Fou LinkedIn Bio
Digital Marketing Slideshares
The Grand Unified Theory of Marketing