Ad Scam Company Profits On YouTube Ads That Should Not Exist (Forbes)
Web security firm Spider.io found that an advertising company, Sambreel, baits YouTube users with a plug-in to download video content. The plug-ins then ultimately become new ad slots on various YouTube pages. The new slots trickle down to small ad exchanges and are ultimately bought up by small companies like dating sites or weight-loss companies, with Sambreel being the sole beneficiary of the zombie ad slots.
NEW YORK (Reuters) – Two security experts said they have figured out how to spy on Verizon Wireless mobile phone customers by hacking into devices the U.S. carrier sells to boost wireless signals indoors.
The finding, which the experts demonstrated to Reuters and will further detail at two hacking conferences this summer, comes at a time of intense global debate about electronic privacy, after top-secret U.S. surveillance programs were leaked by a former National Security Agency contractor, Edward Snowden, last month.
“This is not about how the NSA would attack ordinary people. This is about how ordinary people would attack ordinary people,” said Tom Ritter, a senior consultant with the security firm iSEC Partners.
Traditionally, Blackberry has been the choice of the majorly security conscious, but the times are changing. iOS has been shaping up to be pretty secure, and has even coaxed some US government agencies to jump ship. Now a security firm in Virgina is “neutering” iPads so G men can use those too.
The report comes from Bloomberg, which says the company with the cyber-snippers is one CACI International Inc. What this “neutering” process—CACI’s own words—actually involves is anyone’s guess, but chances are it has something to do with the wireless capabilities, and maybe the camera. CACI CEO Dan Allen put it this way to Bloomberg: “It’s a neutered iPad. We’re working on how do we effectively brand it.”
According to Allen, any iPads you already see in a government leader’s hands, probably came from CACI or someone they work with. So far no one in the government has made a statement about whether or not Obama’s iPad has gotten the treatment, but it doesn’t seem unlikely. If this really takes off, you could start seeing a lot more iPads in active government service, but only if they’ve lost their fun bits first. [Bloomberg via 9to5Mac]
USA Today reports that software security firm Avast surveyed 140,000 of its users, and came up with this stat:
Obviously that’s very bad news for Microsoft as it rolls out Windows 8/RT.
Daring Fireball’s John Gruber says its great news for Apple:
Historically, the single biggest problem Apple faced in the PC market is that most consumers never even considered buying an Apple computer. If this number of potential switchers is even close to true, Mac and iPad sales are going to continue to grow.
There’s a fake Angry Birds Space app
in the Android Market available on Android phones that infests your phone with malware.
According to Sophos, a digital security firm, the malware hides its “payload” deep inside two .JPEG files. Once installed, it downloads additional malware to your phone, and enlists your phone as part of a botnet. From there, your phone can be used as muscle for any number of hacker ops.
The easy way to avoid getting nailed by fake app malware is to always be sure to check the developer on any app you download. If you’ve already downloaded Angry Birds Space, take a second to make sure that you’ve got the right one, and if not, consider securely wiping your phone once you’ve backed up important data.
Update: We originally posted that the fake app was available through the Android Market. That’s incorrect. It is only available through third party stores, so if you go through official Android channels for your apps, you shouldn’t have any problems.
The security PIN system that Google Wallet users have to enter to verify transactions has been compromised. Thankfully, the chances of your wallet being used against you is relatively low—assuming you haven’t rooted your phone, that is.
Since Wallet saves your PIN in an encrypted file on the phone itself, rather than the secured NFC chip, if your phone falls into the wrong hands, that person could lift your PIN file from the phone and simply crack it using brute force. From there, he’d have access to—and use of—your Wallet account.
Security firm, Zvelo, discovered and reported the issue to Google, but because Wallet’s security architecture, the change will require a fundamental rejiggering of the security protocols. Man, talk about an oversight. According to Zvelo,
The lynch-pin, however, was that within the PIN information section was a long integer “salt” and a SHA256 hex encoded string “hash”. Knowing that the PIN can only be a 4-digit numeric value, it dawned on us that a brute-force attack would only require calculating, at most, 10,000 SHA256 hashes…This completely negates all of the security of this mobile phone payment system.
So, if you are rooted, be sure to take some additional security steps to protect yourself like activating the lock screen, disabling the USB debugging option in settings, and enabling full-disk encryption. Or maybe not losing your phone in the first place. [Zvelo via Android Central via The Verge]
Dr. Augustine Fou is Digital Consigliere to marketing executives, advising them on digital strategy and Unified Marketing(tm). Dr Fou has over 17 years of in-the-trenches, hands-on experience, which enables him to provide objective, in-depth assessments of their current marketing programs and recommendations for improving business impact and ROI using digital insights.
Collaborators – Digital Profs
- Netflix vs Blockbuster - Perfect example of an industry replaced by a more efficient version of itself
- The Grand Unified Theory of Marketing(tm) - Digital String Theory
- The JKWeddingDance video was real; the viral effect was MANUFACTURED - Post 1 of 2
- Marketing Costs Normalized to CPM Basis for Comparison
- Coke vs Pepsi vs Dr Pepper
- Samsung 52 inch HDTV $9.99 at BestBuy - purchase receipt below (6:21a eastern time August 12, 2009)
- drag2share: Android's Mobile Devices Control 60% Of The Global Computing Platform Market
- HP Mini 311 Nvidia ION Netbook Hackintosh'ed
- How to manufacture a viral video sensation and make viral profits - Post 2 of 2
- Brand Advertisers: Escaping an Ecosystem of Digital Advertising Fraud
- #SESNY: Toward a Performance Mindset for All Advertising
- Tips for Marketers Selecting a Digital Agency
- Context Is Not King or Queen; It's Just Necessary
- 2013 New Year's Digital Marketing Resolutions
- The Good, Bad, and Ugly of Online Campaign Ratings and eGRPs
- Why You Should Banish the Net Promoter Score Immediately
- Digital Strategy To-MAY-to vs. To-MAH-to
- The Agency-Client Relationship is Forever Changed
- Targeting vs. Privacy - Who Will Win?
- December 2014 (51)
- November 2014 (98)
- October 2014 (150)
- September 2014 (109)
- August 2014 (44)
- July 2014 (92)
- June 2014 (118)
- May 2014 (173)
- April 2014 (130)
- March 2014 (247)
- February 2014 (167)
- January 2014 (222)
- December 2013 (167)
- November 2013 (111)
- October 2013 (116)
- September 2013 (214)
- August 2013 (210)
- July 2013 (200)
- June 2013 (87)
- May 2013 (87)
- April 2013 (70)
- March 2013 (114)
- February 2013 (89)
- January 2013 (136)
- December 2012 (96)
- November 2012 (130)
- October 2012 (147)
- September 2012 (94)
- August 2012 (93)
- July 2012 (112)
- June 2012 (71)
- May 2012 (82)
- April 2012 (80)
- March 2012 (122)
- February 2012 (114)
- January 2012 (129)
- December 2011 (60)
- November 2011 (54)
- October 2011 (29)
- September 2011 (17)
- August 2011 (30)
- July 2011 (18)
- June 2011 (19)
- May 2011 (23)
- April 2011 (23)
- March 2011 (52)
- February 2011 (69)
- January 2011 (108)
- December 2010 (82)
- November 2010 (67)
- October 2010 (68)
- September 2010 (44)
- August 2010 (101)
- July 2010 (61)
- June 2010 (28)
- May 2010 (28)
- April 2010 (26)
- March 2010 (33)
- February 2010 (21)
- January 2010 (13)
- December 2009 (4)
- November 2009 (2)
- October 2009 (14)
- September 2009 (6)
- August 2009 (19)
- July 2009 (34)
- June 2009 (11)
- May 2009 (4)
- April 2009 (6)
- March 2009 (13)
- February 2009 (32)
- January 2009 (25)
- December 2008 (1)
- October 2008 (1)
- June 2008 (1)
- November 2007 (1)