Cyber criminals steal a quarter of digital adverts

the-great-train-robbery-movie-poster-1903-1020549358Almost a quarter of video ads and 11 percent of display ads are viewed by fake consumers created by cybercrime networks to steal the billions of dollars spent on digital advertising.

A study, by digital security firm White Ops and the Association of National Advertisers, is one of the most comprehensive looks to date at the persistent criminal activity involving online advertising. It looks at the problem of “bots” or automated entities that mimic the behaviour of humans by clicking on ads and watching videos.

The bots siphon money away from brands by setting up fake websites or delivering fake audiences to websites that make use of third-party traffic. Advertisers will lose $6.3 billion to bots next year, the report said.

Bob Liodice, the president and chief executive of the ANA, an organization that represents thousands of brands said that it had been suspected there was fraud in the industry, but it was not known how much was being taken or the reasons it was happening.

White Ops monitored 181 online advertising campaigns by the brands from August to October to determine fraud activity.

Bot fraud has long been part of the ecosystem of low-price ads that cost a few dollars or less. This study revealed, however, that many premium websites and publishers, which charge roughly 10 times more for an ad, are just as vulnerable.

In one instance, 98 percent of video ads at a premium lifestyle site were viewed by bots. The bots are extremely effective of looking like a high value consumer.”

Liodice said the report will help the industry develop an action plan to combat fraud.

Microsoft releases the hounds on subscription activators

White Puppy-02In a new move against software pirates, the software king of the world has unleashed its legal hounds on those offering subscription activating software.

Microsoft has filed a complaint at a federal court in Washington accusing a person behind an AT&T subscription of activating various pirated copies of Windows 7 and Office 10. The account was identified by Microsoft’s in-house cyberforensics team based on suspicious “activation patterns.”

Microsoft doesn’t have a long track record of cracking down on individual pirates so this move is new.

Microsoft filed a copyright infringement lawsuit against a person who activated pirated copies of Windows 7 and Office 10 from an AT&T Internet connection.

“Microsoft’s cyberforensics have identified a number of product key activations originating from IP address 76.245.7.147, which is presently assigned to ISP AT&T Internet Services..,” the complaint reads.

“These activations have characteristics that on information and belief, establish that Defendants are using the IP address to activate pirated software.”

While many think unauthorised copies are hard for Microsoft to detect, the company explains that its cybercrime team claims to use state-of-the-art technology to detect software piracy. It looks for activation patterns and characteristics which make it likely that certain IP-addresses are engaged in unauthorised copying.

In this situation, the defendant activated numerous copies of Windows 7 and Office 2010 with suspicious keys, which were nicked from Microsoft’s supply chain, used without permission from the refurbisher channel, and used more often than the license permits.

So, this is not an average user, but someone who sells PCs with pirated software.

Why does Intel need Broadwell H?

12-inch silicon wafer - Wikimedia CommonsThe Dark Satanic Rumour Mill has manufactured a hell on earth yarn which claims that Intel has bumped off its Broadwell H range.

The rumour is based on pure speculation and common sense. Earlier this year Intel told the world that it would be launching its low-power Broadwell processors in “early spring” and Kirk Skaugen, who heads up Intel’s PC Client Group, showed a roadmap to prove it.

Spring was expected to see millions of units in preparation for a very early spring fifth-generation Core launch of our traditional Celeron, Pentium, Core i3, i5, i7 which will be on Broadwell-U and Skylake in the second half of 2015.

But the higher-powered quad-core variants of Broadwell such as the Broadwell-H and Broadwell-M were not mentioned but were expected in “work week 29” and “work week 36” in 2015. That would mean late July to early September.

But if Skylake also appears in the second half of 2015, it seems that Broadwell chips is surplus to requirements. Intel could go traight to Skylake for the higher-performance notebook models  — after all . Skylake has a better CPU core, graphics and media subsystem than Broadwell.

Axing of Broadwell could also be a return to the “tick-tock” method for Intel. Skylake fully ramped in the second half of 2015 means that Intel could conceivably mean that the 10-nanometer Cannonlake product will be ready for deployment for back-to-school in 2016.

Sony gets hacked again

wargames-hackerReports said that Sony has come under a fresh cyber attack following the break in which crippled Sony Pictures two weeks ago.

The Financial Times reported that the PlayStation store was downed earlier today for a couple of hours.

A gang that dubs itself the Lizard Squad has claimed that it is responsible for the hack – and the attack may be nothing to do with the Sony Pictures incident – blamed by some on North Korean hackers.

The Lizard Squad made a similar attack on Microsoft’s Xbox Live service last week, according to the FT.

North Korea said yesterday that it wasn’t responsible for the attack on Sony Pictures, as we reported elsewhere today.

Sony is so far unable to say whether the latest hack attack has resulted in personal or corporate information being stolen.

Ofcom says broadband coverage patchy

parliamentDespite the government maintaining that the UK is on track to deliver broadband just about everywhere in the country, regulator Ofcom said economics mean that’s just not going to happen.

Ofcom said in a report that communication services are used by an average UK adult for over half of their waking hours.

That means, coverage, capacity, and reliability of the digital infrastructure are of fundamental importance to both people and to businesses.

But, said Ofcom: “The economics of networks means there are parts of the UK that will not be fully served by the market.  There are also some services which may not be provided to all by the market.”

Either Ofcom or the government could intervene to make life better for people/

Ofcom said that fixed broadband technology is “almost universally available” – the average download speed is 23Mbit/s. But broadband speeds vary quite a lot, the organisatiion said.

The government aims to provide universal availability of at least 2Mbit/s – only three percent of UK sites fall below this.  But this causes difficulties for those affected.

Fifteen percent of UK households can’t get 10Mbit/s speed/

Ofcom said that the government target to deliver superfast broadband to 95 percent of premises by 2017 “is an aggressive target”.  About 18 percent of households still don’t access the internet, whether fixed or mobile.

3D nanostructures mean low cost

nanoScientists at North Carolina State University (NCSU) said they created a new lithography technique that uses nanoscale spjeres to create 3D structures.

The structures will be of use in electronics, biomedics, and photonics, the researchers said.

Dr Chih-Hao Chang, a professor of mechanical and aerospace engineering at NCSU claimed the approach will reduce the cost of nanolithography “to the point where it could be done in your garage”.

While conventional lithography focues light on a photosensitive film to create 2D patterns, those methods need expensive specialised electron beams, lasers or special lenses. The researchers at NCSU said they put nanoscalte polystyrene spheres on the surface of the photosensitive film

The nanospheres are transpart but bend and scatter light in predictable ways.

Chang said: “We are using the nanosphere to shape the pattern of light, which gives us the ability to shape the resulting nanostructure in three dimensions without using the expensive equipment required by conventional techniques.  It allows us to create 3D structures all at once, without having to make layer after layer of 2D patterns.

Applications could include nanoscale “inkjet printers” to create electronics, biological cells, antennae or photonic components.

Storage revenues continue to grow

storageThe generation of vast amounts of data continues to fuel the disk storage systems revenue in the third quarter.

With revenues of $8.8 billion, up 5.1 percent from the same period last year, 25 exabytes shipped in the quarter, said IDC.  Capacity shipments soared by 42 percent during the quarter, compared to Q3 2013.

IDC said sub $100K external array revenues grew by over six percent during the quarter, but shipments ODMs (original design manufacturers) directly to hyperscale datacentres showed positive growth.

EMC remains at the top spot for the quarter, followed by HP, Dell, IBM and Netapp.

ODM direct sales accounted for 24 percent of the market however, outstripping the traditional vendors.  And this trend is continuing, as we’ve reported previously, with ODMs also shipping more and more servers directly and bypassing the brand names,

Smartphones will win the day

smartphone-shoppingA report predicted that by 2018 over 50 percent of people will use either a smartphone or a tablet for all online activities.

Gartner said people will gradually move away from the PC as people use smartphnes and tablets more more.

Voice, gesture and other ways of communicating with devices online will be the rule of thumb, while 40 percent of enterprises will use wi-fi as the default connection and Ethernet will go away.

Security built into wi-fi appears to be adequate to the task, said Gartner, after the introduction of Advanced Encryption Standard (AES) into the equation.

And there’s more good news.  Gartner thinks by 2020 we’ll all be paying less than $100 for smartphone and other devices.  Subsidies or sponsorships will also reduce the cost of devices while by 2018 over half of business to enterprise (B2E) mobile apps will be used by business analysts using codeless tools.

Cisco sues Arista

ciscologoNetwork equipment maker Cisco Systems has sued Arista Networks for copying its networking technologies.

The lawsuits, filed in a federal court in California, accuses Arista of infringing on 14 patents on networks and also on related copyrights.

Cisco General Counsel Mark Chandler wrote in his bog that rather than building its products and services based on new technologies developed by Arista, however, and providing legitimate competition to Cisco, Arista took a shortcut by blatantly and extensively copying the innovative networking technologies designed and developed by Cisco.

Arista was formed by former Cisco employees, including Chief Development Officer Andreas Bechtolsheim, Chief Technology Officer Kenneth Duda, and Chief Executive Officer Jayshree Ullal.

Arista said it had not yet been able to evaluate the lawsuits.

“While we have respect for Cisco as a fierce competitor and the dominant player in the market, we are disappointed that they have to resort to litigation rather than simply compete with us in products,” Arista said in a statement.

 

IPod DRM court case could collapse on technicality

novità-apple-2013After ten years trying to get an antitrust case against Apple to court, the case might collapse because the plaintiffs can’t prove they ever bought an iPod.

The antitrust case was messy and would have bought a fair few skeletons out of the closet proving that Jobs’ Mob had done its best to kill off rivals with some dirty deeds ordered by its Messiah Steve Jobs.

The case is so old that Jobs even recorded a video testimony defending his actions. The lawsuit covers iPods purchased between September 2006 and March 2009. Lawyers representing both consumers and businesses claim that the restrictions meant Apple could inflate the prices of iPod in an anti-competitive manner. They are seeking $350m in damages, which could be tripled under US competition laws.

However, now it seems that he case might get chucked out on a technicality. Lawyers for Apple have raised a last-minute challenge saying new evidence suggested that the two women named as plaintiffs may not have bought iPod models covered by the lawsuit.

Apple lawyers checked the serial number on the lead plaintiff’s iPod Touch and found it was bought in July 2009. The other main plaintiff, Melanie Wilson, also bought iPods outside the relevant timeframe, they indicated.

Judge Yvonne Gonzalez Rogers said at the end of the trial’s third day of testimony in Oakland, California said she was concerned that she did not have a plaintiff.

Lawyer Bonny Sweeny said that her team was checking for other receipts. She conceded that while Ms Wilson’s iPod may not be covered, an estimated eight million consumers are believed to have purchased the affected devices.

It is a pity as so far it has emerged in the trail that between 2007 and 2009, if an iPod owner tried to sync their device with iTunes and had music from another digital store on the device, they would receive an error message telling them to restore their iPod to factory settings. This effectively wiped all non-iTunes music from the device.

Apple maintained at the trial that the software and restrictions were necessary to protect users from malicious content and hackers.

Cameron’s porn filter deletes other sites too

stupid cameronBritish Prime Minister David “One is an Ordinary Bloke” Cameron’s porn filter is being used to purge the internet of a few sites that he does not want British people to see.

The alarm call was sounded by the German hacker site the Chaos Computer Club over the weekend which noticed that its site had been blocked in the UK.

Vodafone customers were also being stopped from accessing the ticket sales to this year’s Chaos Communication Congress.

The group claims that its sites were on a list which censors the open internet. These internet filters, authorised by Prime Minister David Cameron, are implemented by UK’s major internet service providers (ISPs) were supposed to stop porn from falling into the hands of children. But it appears that the list has been extended to include material deemed “extremist”.

Users can opt-out of censorship, or bypass it by technical means, but only a minority of users know how to bypass those filters.

Chaos points out that accessing its server directly via http://213.73.89.123/ appears to work quite well, thereby rendering the censorship efforts useless.

CCC-spokesperson Dirk Engling said that he saw this as proof that censorship infrastructure – no matter for which reasons it was set up, and no matter which country you are in – will always be abused for political reasons

North Korea not involved in “righteous hacking”

Kim Jong Un, courtesy of North Korea news agencyNorth Korea has denied it was involved in the hacking of Sony, but indicated it considered it a “righteous deed” and owed the hackers a drink.

North Korea was jolly cross that Sony Pictures was producing a film that depicts an assassination plot against Pyongyang’s supreme leader Kim Jong Un.

While denying responsibility for an attack last week that disrupted Sony’s computer system and spewed confidential information onto the Internet, an unidentified spokesman for the North’s powerful National Defence Commission acknowledged that it “might be a righteous deed of the supporters and sympathisers” of the North’s call for the world to turn out in a “just struggle” against US imperialism.

The statement claimed that North Korea did not know where in America the Sony Pictures is situated and for what wrongdoings it became the target of the attack.

“But what we clearly know is that the Sony Pictures is the very one which was going to produce a film abetting a terrorist act while hurting the dignity of the supreme leadership of North Korea.”

The Kim family has ruled for three generations, and sees any outside criticism or mockery of its leader as an attack on its sovereignty.

The movie “The Interview,” is a comedy starring Seth Rogen and James Franco, and its plot concerns an attempt on the life of leader Kim Jong Un and Pyongyang does not find the idea funny.

“The United States should know that there are a great number of supporters and sympathisers with North Korea all over the world as well as the `champions of peace’ who attacked the Sony Pictures,” the statement said.

“The righteous reaction will get stronger to smash the evil doings.”

SAP rejects Microsoft merger

sapbeerThe German outfit  which makes expensive esoteric business software and no-one really knows what it does, has decided that it will not allow itself to become part of the glorious Microsoft Empire.

Rumours were flying that SAP was to merge with Microsoft as both of them try to corner the business software market.

However it looks like the German software maker SAP will remain an independent company in the long term, its chief executive told a German newspaper.

Bill McDermott told weekly Euro am Sonntag that it would be best for the company to stay independent is to grow and to have a good market capitalisation.

With a market capitalisation of $86.6 billion, SAP is the fifth-largest company in Germany’s large cap DAX index.

Apparently, SAP had held talks about a potential merger with software giant Microsoft but discussions were scrapped because of the complexity of any deal and the subsequent integration of the companies. All this happened in 2004, so it appears that this rumour was a bit like us – rather elderly but for some reason will not go away.

 

Your binmen are watching you

wheeliesA Freedom of Information (FOI) request made to Oxford City Council has revealed that the folk who pick up your wheelie bins are filming you in secret.

After a wheelie bin in TechEye’s front garden in Oxford wasn’t picked up, we called the council to ask why.

The council said that we didn’t have the bin in the right place for collection and supplied photos showing how we’d offended. We hadn’t, by the way.

Our FOI request asked Oxford City Council which Act of Parliament authorised the filming of people’s houses; how long the footage was kept; whether employees were aware they were being filmed; and whether the information was shared with other authorities internally and externally.

We received the answers to those questions today.

The council said:

1.    There is no specific legislation preventing the CCTV recording of
private property taken from public places (in this case the public
highway). The system is operated in accordance with all the requirements
and the principles of the Human Rights Act 1998, and the Data Protection
Act 1998.

2.    The footage is stored on a hard drive in the vehicle and the image
storage time does fluctuate, but is generally around 8 weeks.

3.    Yes. Staff are fully aware that they are being filmed. A full
consultation with the Unions was undertaken before the cameras were
installed on our vehicles.

4.    No. The system is operated in accordance with all the requirements
and the principles of the Human Rights Act 1998 and the Data Protection
Act 1998 and therefore, has the potential for images to be released, on
request, to the police and/or other agencies.

So there you have it. Your binmen and the council are watching you.

Human error causes most data breaches

Detail showing fleeing Persians (King Darius centre) from an AncA request to the Information Commissioner’s Office (ICO) under the Freedom of Information Act has revealed that most data breaches are caused by human error.

Egress Software made the FOI request and the ICO revealed that only seven percent of breaches in the first three months of this year were because of technical glitches.

That means the fast majority were down to human error and carelessness by people.  And fines levied because of technical errors amounted to zero, while the ICO levied £5.1 million for companies that made the mistakes.

The data breaches are across many different sectors. The public sector showed healthcare organisations are top of the disgrace league, followed by local government and educational organisations.

The private sector also showed a rise in data breaches with the financial industry, the housing sector, telecoms and recruitment all showing big rises.

Tony Pepper, CEO of encryption company Egress Software, said: “It is concerning that such a high number of data breaches occur as a result of human error and poor processes. Confusion can often put confidential data at risk, with users unsure of when and how to encrypt.”