Last week a group of six 'm-commerce' experts took part in a round robin discussion in Manchester, England to determine the best ways forward for developers interested in creating a serious mobile web presence yet wanting to make money through the medium of mobile advertising at the same time. Anyone who has been involved in this particular area of Internet growth will appreciate just what a serious challenge the mobile web presents to those who have not invested, in thought and deed as much as financially, in getting to grips with a realistic m-commerce marketing strategy. Unless you are creative …

Member Avatar
Member Avatar
+0 forum 8

Google's seemingly always changing indexing algorithm continues to hit site rankings as the search giant continues to drive a new generation of SEO relying upon original and relevant content generation and sharing above all else. Now a panel of SEO experts in the UK has warned that companies need to avoid putting all their SEO eggs into the one Google basket and instead embrace SEO strategic evolution in order to maintain and grow traffic. ![dweb-google](/attachments/small/0/dweb-google.jpg "align-right") At a round-table discussion, hosted by cloud provider UKFast, Sam Allcock, CEO of Custard Media, stated that the key to successful audience growth was …

Member Avatar
Member Avatar
+5 forum 40

In the modern world, it’s easy to understand that data is absolutely essential to many corporations and organizations. There is an ever-growing need to understand the needs and desires of your customer base, so that you may tailor your products/services/platform as much as possible to meet these particular needs. However, we also are coming to a point where human beings are beginning to realize that the way that their data is being used can be quite harmful. One of the most obvious examples is the [Facebook-Cambridge Analytica scandal](https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.html), in which data from Facebook’s user base was used to influence a …

Member Avatar
Member Avatar
+2 forum 1

For those very new to this area, please google SIM SWAP and discover a very nasty security issue with all phones we use today. At first glance the new security researcher might think I'm exaggerating. Do your own research and tell me you don't find this to be one of the most foul, nasty exploits I've seen in years. This exploit was recently used to highjack a writer's phone at https://www.zdnet.com/article/sim-swap-horror-story-ive-lost-decades-of-data-and-google-wont-lift-a-finger/ His case is still developing with loss of accounts, tax returns he stored on the Clouds, and a 25,000USD Bitcoin purchase. And we're not talking thousands of dollars in …

Member Avatar
+0 forum 0

Hello friends, How to promote my business through Digital Marketing? My business purely depending on Oil and Gas Industry.

Member Avatar
Member Avatar
+0 forum 9

The Conservative party issued a statement on Saturday which apologised for "any concern caused" and confirmed that "the technical issue has been resolved and the app is now functioning securely." However, not before Boris Johnson's profile image had been changed to a pornographic one and that of Environment Secretary, Michael Gove, swapped for a picture of Rupert Murdoch. Some ministers, and other MPs, apparently reported receiving nuisance calls following the app breach. The Information Commissioner's Office has confirmed that it is investigating the incident, and bite the Tories with a large fine. Under the EU General Data Protection Regulation (GDPR), …

Member Avatar
Member Avatar
-1 forum 1

I would like to inform the people here on this site (Daniwebs) community know that my account here with Daniweb was not only accessed and found to have been accessed on the Darkweb, it was hacked. I have yet figured out exactly what they were using my account for, or to do while on my account yet and from where, what IP address or hopefully who. When I do figure this out, I will update as I make progress. A note to those that are quickly thinking "I must have used an unsecure password like password, 1234, admin, etc." well …

Member Avatar
Member Avatar
+0 forum 8

I want to learn about real estate business and stock trading. Thanks to everyone sharing for less experience. I'm a newcomer

Member Avatar
Member Avatar
+0 forum 2

what is google tag manager?

Member Avatar
Member Avatar
+0 forum 1

Hey lately i have currently been looking for a new cpu cooler considering that i still have the default stock cooler that came with the cpu and/or case... Which isn't really doing its job too well not cooling and extremely loud (doesn't help that the computer is in the hottest room thats like a oven through out the day). I would like to aim for something between $30-60$ excluding postage costs (preferably something cheaper thats half decent).

Member Avatar
Member Avatar
+0 forum 2

The title of the new employee training module alone was a sign that times have changed. This topic never came up in all my years at any job. Here's the boil down of the course. > If there is an active shooter in the area, we suggest you first run (away), hide and if forced fight I shared this with a friend in HR in Canada and they were mildly shocked. This wasn't my training session but my son at his new job.

Member Avatar
Member Avatar
+0 forum 5

Guardian newspaper columnist [Dawn Foster](https://twitter.com/DawnHFoster) posted images on Twitter this weekend showing how she was able to login to the official Conservative party conference app as Boris Johnson, until recently the UK Foreign Secretary. Not only was there no password required to login to the app, all that was required was an email address, but once in all the details of user registration were accessible. So, in the case of Alexander Boris de Pfeffel Johnson (yes, that is his real name) that meant contact details such as his mobile phone number. It also meant that the logged in user could …

Member Avatar
Member Avatar
+0 forum 6

I've been writing about various security risks in the health sector for many years now. Usually my articles cover patient privacy, data protection and health provider network insecurity issues. Occasionally, they spill over into darker territory where the cyber risk morphs into a very real one as far as the health of the patient is concerned. Take my story at SC Magazine a couple of years ago which reported how researchers at Rapid7 had uncovered vulnerabilities in an insulin pump that had the potential to change the dosage supplied. Sure, the actual risk of exploit was low given that an …

Member Avatar
Member Avatar
+1 forum 1

I take security and privacy issues seriously, but sometimes I despair when news stories such as that regarding Samsung TVs eavesdropping on private conversation explode across the media as happened last week. The reason for my despondency has less to do with the data privacy debate and more to do with the human stupidity one. That said, let's get the technical bit out of the way first. The privacy scare story kicked off after someone, eventually, noticed that privacy policy relating to Samsung smart TVs included the line: "Please be aware that if your spoken words include personal or other …

Member Avatar
Member Avatar
+3 forum 7

When this news came across I only had to think of MSFT's prior acquisitions to think this may not end well. As the song goes " Should I Stay or Should I Go"?

Member Avatar
Member Avatar
+1 forum 7

Here's the full notice -> https://arstechnica.com/information-technology/2018/05/fbi-tells-router-users-to-reboot-now-to-kill-malware-infecting-500k-devices/ You can read what happened if you wish but just a r̴e̴b̴o̴o̴t̴ ̴a̴n̴d̴ ̴i̴t̴'̴s̴ ̴g̴a̴m̴e̴ ̴o̴v̴e̴r̴ ̴f̴o̴r̴ ̴t̴h̴i̴s̴ ̴m̴a̴l̴w̴a̴r̴e̴.̴ **Update in new reply.**

Member Avatar
Member Avatar
+0 forum 1

Hello, I would like to introduce myself and share a bit of information about the new API we are developing. The product was just launched in February and is in the beginning phase. I would highly appreciate any kind of comment or advice when it comes to improving the development or advertising of this product. My name is Milica and product is called Publitio. Publitio attempts to take the pain out of the Media Asset Management (MAM) process by easing common tasks used by the majority of web & mobile apps, such as media files uploading, storage, processing, and delivery, …

Member Avatar
Member Avatar
+0 forum 1

It has long since been argued that continued exposure to something over a length of time will reduce the shock value of whatever it happens to be, from violence in movies to swearing in public. Now according to a [URL="http://www.usatoday.com/news/health/2007-12-12-porn-study_N.htm"]report[/URL] researchers at the Brigham Young University have suggested that the availability of 'pocket porn' via the Internet and mobile phones has led to a sea change in how women react to pornography. The full study is to be published in the Journal of Adolescent Research in January, but enough detail has been leaked ahead of publication for us to know …

Member Avatar
Member Avatar
+0 forum 10

The second annual Imperva Hacker Intelligence Initiative report, this one entitled [Monitoring Hacker Forums](http://www.imperva.com/docs/HII_Monitoring_Hacker_Forums_2012.pdf), is out and reveals that the threat surfaces being discussed by the hacker community are very different from those that businesses are spending money on defending against attack. ![dweb-hackers](/attachments/small/0/dweb-hackers.jpg "align-right") The Imperva research analysed the content of a number of online hacker communities, including many lesser known forums in order to get a more accurate snapshot of what those doing the hacking are actually discussing. By looking at a total of more than 400,000 different conversational threads, Imperva was able to determine that SQL injection and …

Member Avatar
Member Avatar
+0 forum 2

According to the [Australian Federal Police](http://www.afp.gov.au/), it would appear that at least half a million credit cards 'down under' have been compromised and funds in excess of AUS $25 million (US $26 million) stolen. Although precise details are still coming in, it would seem likely that nothing more complicated than a bit of simple scanning for point of sale terminals which looked vulnerable was used to locate potential victims in the small retailer market rather than run the greater risk of detection by targeting banks or bigger business. Lessons learned from the Subway caper in the US last year no …

Member Avatar
Member Avatar
+2 forum 4

Radiohead are a band which does not need to prove anything to anyone. Their seminal album 'OK Computer' is consistently voted one of the greatest recordings of all time, be it the critics or mere mortal music fans putting the crosses in the boxes. Which is perhaps why the latest Radiohead album '[URL="http://www.inrainbows.com"]In Rainbows[/URL]' has not been made available through the usual channels, but rather the group have bucked the trend and challenged the music industry by making it available for free download instead. It was not meant to be quite that simple, of course. The distribution and sales model …

Member Avatar
Member Avatar
+0 forum 3

Want to buy a Dell machine loaded with Linux? Shame, as it appears that Dell Europe would really rather you bought a Windows-powered one, despite having a website devoted entirely to selling Dell Ubuntu laptops. And, oh boy, does it use some strange arguments to dissuade you from becoming a Linux convert. [attach]15934[/attach]Three years ago Dell went Ubuntu bashing, making it really pretty hard to buy a Linux-loaded machine from the vendor. The Linux machines back then cost more than the Windows ones, there were warnings about it not being compatible with lots of software and to top it all …

Member Avatar
Member Avatar
+7 forum 35

Hello everybody i would like some worked on the field of **SQL test cases generation based mutation**. In fact i almost wrote the test cases mutation code and i generated mutated test cases. but now i want to validate thus inputs or test the mutation by verifiying the killed and survived mutants on other softwares or web-based applications...........please any help any ideas i really i spent long time i read a lot of paper but couldn't find how to do it

Member Avatar
+0 forum 0

You may have noticed the Google Webmaster Central blog has a new address: webmasters.googleblog.com.

Member Avatar
+0 forum 0

CryptoWall 4.0 the newest ransomware to date is been spread by Angler Exploit Kits. A new drive-by download campaign is to blame for this attack. Heimdal was the first to discover the malware nearly one month ago. It's also more stealthier than previous versions and also a lot stronger. This time the message is different and more filenames had been added to the list. Also users have to fork out $700 for the decryption key which makes it a hefty price to pay. Firstly the Pony Information Stealer scrapes the computer of usernames and passwords by scouring the victims computer. …

Member Avatar
+0 forum 0

I need Australian directories which allow more than 1 URL submission of the same site for free, Can anyone help?

Member Avatar
+0 forum 0

It's all too easy to think that spam is an old problem, and one that has largely been dealt with. Certainly, many people will tell you that they see very little evidence of spam in their mailboxes. This, however, has less to do with the demise of the spammer and everything to do with the effectiveness of spam filters. The latest Kaspersky Lab analysis of the spam and phishing threat landscape for the first quarter of 2015 suggests that some 59.2 per cent of email traffic was actually spam, which is good news in as far as that number is …

Member Avatar
Member Avatar
+3 forum 3
News Story Dark Web Down?

The UK's National Crime Agency (NCA) has said that it has dealt a "major blow to dark web markets." In a [statement](http://www.nationalcrimeagency.gov.uk/news/news-listings/483-international-law-enforcement-deals-major-blow-to-dark-web-markets) issued on the 7th November the NCA says that a coordinated operation between law enforcement agencies in Europe and the US has "targeted market places for illegal commodities on the dark web" and as part of this six people in the UK were arrested. Amongst those arrested in strikes closely coordinated with international partners in the US were the suspected administrators of Silk Road 2.0, the Tor accessed drugs and firearms market place. The NCA statement also claims …

Member Avatar
Member Avatar
+1 forum 7

Although it took eBay itself an absolute age to disclose that a serious breach had taken place, and then [completely screwed up the process of ensuring users change their passwords](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/479152/more-ebay-security-stupidity-exposed), this should come as no real surprise. Happygeeks' Law states: the larger the corporate, the longer it takes to admit anything and the bigger the chance it will handle it badly. What is surprising is that it has taken so long for the stolen database of user credentials to go up for sale on the dark market. If you consider that the breach itself happened a couple of months ago, …

Member Avatar
Member Avatar
+1 forum 4

The news that JPMorgan Chase & Co, which is the largest of the US banks with a reach that extends to half of all American households, has been breached will surprise nobody. At least not in the sense that this is old news, with a disclosure of the event happening in August. The actual breach was discovered by the bank back in July, and is thought to have been active for at least a month prior to that. What is surprising, however, is that a financial organisation of such a size and reputation should fall victim to such a breach …

Member Avatar
Member Avatar
+1 forum 2

The End.