fbpx

If there's a word that describes the retail space in 2016, it's change. Change in technology, tools and best practices. And, (no surprise), 2017 promises more of same.

Here are five trends destined to make retailing more effective and profitable in 2017.

Multi-channel data integration

After using data analytics for several years, retailers are getting a clear idea of the benefits that high-volume, high-speed data analytics can provide. Unlimited computing capacity in the cloud and advanced analytics enable retailers to overcome a familiar challenge: collecting and analyzing huge volumes of different types of data (databases, social media and instant messages, reports).

More recent developments show by using data analytics software, retailers can unify online and offline data by:

  • Extracting data from different places such as legacy systems and database platforms on-premises or in the cloud.
  • Using new sources of data from commerce, supply chain and customer channels.
  • Integrating conventional retail information and data from new channels with company ERP, order management and warehousing software.
  • Delivering useful operations suggestions quickly enough to capture business opportunities as they occur. Modern data analytics software can cut the time from weeks to minutes.

Modern retail analytics software packages customer and supply chain data and trends in a single view of what's going on. Putting all relevant data into a form that's easy to understand and use helps business users set up operational and promotional strategies and continue to improve efficiency and performance.

Predictive data analytics

Every retailer wants to have the right products available to customers at the right place and time. Making this happen, however, is not an easy matter.

Data analytics provides retailers with a better understanding of their current business.Predictive analytics provides retailers with a look into the future.

Until recently, retailers had to rely on insights gained from their own experience and retailing skill, analyst forecasts and customer feedback. But it all added up to high-quality educated guessing.

Predictive analytics uses mountains of data, which retailers already have, and a wide array of technologies and approaches (statistical modeling, data mining and other techniques) to analyze and project the likely outcome of future events and consumer behavior.

The biggest business value of predictive analytics is its ability to help retailers stay ahead of the expectations of discerning, tech-savvy consumers. This includes:

  • Delivering a better shopping experience. That is, enabling customers to shop whenever and wherever they want in an attractive, no-worries environment, in the store or online.
  • Getting a clearer view of customers. This includes a 360-degree view of customers and click-stream analysis.
  • Merchandizing and planning. Add real-time promotions, demand forecasting, pricing and markdown optimization and out-of-stock analysis and management.

One of the biggest changes in retail analytics lies in where all this data comes from.

Internet of Things in retail

Pioneering major retailers are scrambling to collect and analyze data from the Internet of Things. Customers provide useful IoT data by using and connecting to smartphones, tablets and wearables. Brick-and-mortar stores use IoT data generated by digital signage and other in-store sensors and devices.

Together, these sources generate massive data stores that describe customer behavior. Retailers use this data to make decisions and create sales strategies for their brick and mortar stores and distribution centers.

Innovative uses of IoT data and technology enable retailers to:

  • Customize a shopper's in-store experience. Increasingly, customers expect personalized service. Data collected from in-store IoT devices and the shopping history of connected consumers enable retailers to create a shopping profile of each customer. IoT data analysis discovers shopping patterns that help retailers deliver a more customized shopping experience.
  • Make in-store operations more efficient. Data harvested from in-store, IoT-enabled smart cameras, beacons, and sensors provide store managers and employees with a deeper understanding of what does and doesn’t work well on the floor. For example, analysis of real-time location datafrom smartphone apps can be transformed into customer traffic patterns and buying behaviors. With this information, employees can be alerted to bottlenecks immediately and reduce customer wait times at the cashiers.
  • Improve inventory and supply chain management. Smart transportation management applications and demand-aware warehouse fulfillment are two ways to transform IoT data to into an understanding of what’s underperforming, overstocked or running out of stock at your store.
  • Take advantage of new revenue opportunities: Leading-edge retailers are using the IoT to find new methods of acquiring customers and increasing revenues. For example, beacons and Wi-Fi can create an in-store environment, in which customers engage in contests, meet-and-greet events and social media product reviews.

Self-service analytics software  

Not long ago, data analytics software users had to wait for reports designed and delivered by data analyst middlemen. When customers lobbied vendors for change, they got results. Business users got self-service applications that included easy-to-use dashboards and enabled direct queries. The software empowered business users to ask relevant questions and get answers—quickly—without data science degrees.

Specialized retail analytics software enables store managers and retail decision makers to:

  • Use easy-to-understand analytics methods on data relevant to their store.
  • Easily access, explore, and analyze data with just a few clicks
  • Quickly and easily engage with supply chain data.
  • Make decisions by analyzing products and merchandising methods.
  • Identify spending patterns and gain insight into customer behavior by choosing from a library of interactive visualizations.

Mobile to the rescue

We’ve all heard the complaint that customers enter brick-and-mortar stores with more product information than the staff. Equipping staff members with mobile devices linked to key internal applications and databases enables associates to personalize customer services and perform "save the sale" rescues with pricing, promotion and product information.

Author:  Ilan Hertz

Source:  http://www.retailcustomerexperience.com/blogs/data-analytics-and-the-changing-world-of-retail-in-2017

Categorized in Search Engine

Donald Trump floated the idea of creating a Muslim registry while campaigning. In recent weeks, prominent tech companies.

But it might not be the major household names you need to worry about. Data brokers, which mine your online activity and spending habits, haven't said whether or not they would help the incoming administration create discriminatory databases. So we asked.

Data brokers collect and sell data about consumers gleaned from the sites you visit, the purchases you make, and the groups you belong to.

Advertisers, insurance agencies, healthcare firms, or anyone else can buy the reports and target individual consumers based on their political affiliations, health concerns, net worth, religion, and ethnicity.

Data brokers have already created databases full of personal information -- and political parties or government entities are able to purchase them.You can already search for and buy databases of individuals based on race, ethnicity and religion, and consumers don't know where or how their data is being sold. A search for "Muslim" on the mailing list search engine NextMark pulled up 59 lists. 

There are as many as 5,000 data brokers worldwide, according to Gartner.

"I am very pleased that the tech companies have come out with a lot of solidarity," Pam Dixon, executive director of the World Privacy Forum, told CNNMoney. "But unless we have the data brokers, who have the actual data, agree to the same kind of restraint, we're going to have a problem."

CNNMoney asked some of the largest data brokers whether they would provide data or help a Trump administration build a national Muslim registry or a database based on race, religion, ethnicity or sexual orientation.

Three companies -- Acxiom, Recorded Future, and CoreLogic -- said they would not help to build a Muslim registry.

Oracle (ORCLTech30), which owns firms BlueKai and DataLogix, declined to comment. Oracle CEO Safra Catz, who was part of Trump'stech roundtable last week, is joining his transition team and will remain at the company.

Salesforce, which owns Buddy Media and ExactTarget, said it will not participate in a registry of any kind. CEO Marc Benioff has been outspoken against Trump and was not invited to the tech roundtable.

"Equality for all people is a core value of Salesforce and we oppose any effort to discriminate against anyone," a Salesforce spokesperson said in an email to CNNMoney.

eBureau, ID Analytics, Intelius, PeekYou, and TowerData did not respond to our request for comment.

ACLU senior policy analyst Jay Stanley compared the multi-billion dollar data broker industry to East German surveillance -- where they gather as much information as possible to keep files on people.

"But it's not done for political reasons like it was done in East Germany, it's done for commercial reasons," Stanley told CNNMoney.

However, Stanley said information tracking systems created for one purpose could be used for another. As prominent security technologist Bruce Schneier said in 2007, "It's bad civic hygiene to build an infrastructure that can be used to facilitate a police state."

Hundreds of entrepreneurs, investors, CEOs and tech workers have signed on to efforts promising to never help build a Muslim registry.

But it's worth noting the U.S. previously established a Muslim registry. The National Security Entry-Exit Registration System (NSEERS) program was launched after the September 11 terrorist attacks. It required malevisa holders16 and older from 25 countries to register with the government and frequently check in with immigration officials. Of the 25 countries, only North Korea didn't have a dominant Muslim population.

President Barack Obama took all countries off the list in 2011.

Some data brokers may have policies in place to prevent the creation of a registry based on race, religion, or sexual orientation, even if the government is a client. Axciom has an "ethical interrogation program" to determine whether the client is using data legally.Data brokers may also let you opt out of data collection, or let you see how much they know about you.

These firms operate in a largely unregulated industry. Facebook recently came under fire for allowing advertisers to potentially discriminate against users with regards to housing, which is prohibited under the Fair Housing Act. It updated its advertising options to prevent it.

The paradox with data brokers, Dixon says, is that the government would have to adopt laws to regulate and enforce ethical collection and distribution of data. And it's the incoming administration that has proposed the registries.

The data brokers contacted for this story don't represent the entire industry. But if even a small number decide to cooperate in building human databases and sharing them for surveillance purposes, there could be damaging consequences for consumers.

"The data industry has moved so quickly, it would require a critical mass of data brokers and analysts to say, 'We're not going to build things that discriminate against people in general,'" Dixon said.

Author : Selena Larson

Source : http://money.cnn.com/2016/12/20/technology/data-brokers-muslim-registry/

Categorized in Internet Technology

Gmail Supports a plethora of search operators to help you instantly find that elusive email message buried in your mailbox. You have size search – like larger_than:5mb – to find the big messages in your account. File search – like has:attachment filename:doc – will locate email messages that contain file attachments of specific types. This graphic illustrates all the known search operators that work both on Gmail and Google Inbox.

Date Search in Gmail

Date search in Gmail helps you locate emails sent or received in a specific period. Here are some examples:

  • newer_than:7d from:me – Emails sent in the last 7 days
  • after:2016/12/01 to:me – Emails received in the month of December 2016

Specify Time Modifiers in Gmail Search

Gmail also supports time-based searches allowing you to find emails in the specific hour, minute or second. For instance, you can limit your Gmail search to emails that were received between Dec 10 8:15 PM and Dec 10, 2016 8:45 PM.

To get started, convert the date and time to Epoch time and then use the timestamp with the standard after or before search operator of Gmail.

For instance, the Epoch time for Dec 10, 2016 8:15 PM is 1481381100 and the Epoch time for Dec 10, 2016 8:45 PM is 1481382900. Use the search query after:1481381100 before:1481382900 and you’ll get a list of all emails received during that 30-minute period.

Epoch time is the number of seconds that have elapsed since January 1, 1970 (UTC). Use the Epoch converter to represent a human readable date and time in Epoch and use that timestamp with the before or after search operator of Gmail to find that elusive email.

Author:  Amit Agarwal

Source:  http://www.labnol.org/internet/gmail-search-tips/29206/

Categorized in Online Research

Mobile health has experienced dynamic growth during the past 2 years. All smartphone platforms now have a wide range of apps for management of medical conditions, fitness, and home health monitoring. As consumers become more comfortable with smartphones, their use of apps to manage health and fitness will increase. This is an update to a previous article where we analyzed search trends in Mobile Health using Google Trends.

Google Trends allows users to search its database for trends in search data. The data are scaled from 0 to 100 and plotted over a time scale to create a line graph, with 100 being the peak popularity for a particular search term. Users can compare up to five search terms and apply various filters to refine their search. While search trends might not directly reflect the popularity of apps, it does give a sense of search interest.

Fitness, Health, and APIs

Fitness apps have consistently been the most popular way consumers utilize Mobile Health. Before 2014, the general term “fitness app” was the most popular search term when compared to other popular Mobile Health terms. This changed in 2014 when there was a spike in searches for “health app”.

Google Trends Highlight Trends in Mobile Health

Google Trends Highlight Trends in Mobile Health

This change happened in conjunction with innovations in mobile health, and can be tied to the introduction of Google and Apple’s health APIs for their respective mobile platforms. Google Fit APIs were introduced during the 2014 Google I/O conference, and Apple introduced HealthKit during WWDC 2014. The spike in “health app” correlates with searches for apple and google’s APIs as seen below:

Google Trends Highlight Trends in Mobile Health

Google Trends Highlight Trends in Mobile Health

Now that specific products have been developed for these platforms, “health app” has trended back down to nearly the same level as the term “fitness app”. Health and fitness have been trending more than apps for specific medical conditions, and 2014 saw the largest growth for the field.

Apps for Specific Medical Conditions

In comparison to health and fitness, searches for medical apps specific to common diseases were less frequent. Fitness and health apps had to be excluded in order to see a difference between apps for medical conditions. There are many reasons for this disparity. Compared to fitness, medical diagnoses like diabetes currently do not share the same appeal of posting significant milestones online. Social interactions within apps are a major reason for generating interest and participation, an appeal that most medical apps lack. Fitness applications are also marketable to a broader segment of the consumer market. Health and Fitness apps typically require minimal user input as activity data is tracked automatically from wearable tech and mobile devices. This is in comparison to most diabetes monitoring apps which still require manual input of blood glucose levels. These advantages over medical conditions could account for the increased popularity of health and fitness apps.

There is also a distinct separation of popularity between specific diagnoses. The general term “medical app” remains the most frequent search term. Searches for “Pregnancy app” were higher than other medical conditions such as diabetes, cholesterol, and blood pressure. This is despite the fact that there are more people with these chronic medical problems when compared to pregnancies. There are several factors that could explain this difference. The targeted demographics differ, with the majority of those in childbearing age now being millennials who have grown up with mobile technology. The diagnosis of pregnancy carries an intensive period afterwards where patients seek progressive education and guidance. It is intuitive that younger generations of consumers are more likely to utilize apps as a resource for knowledge and guidance in health. Pregnancy is unique in that it carries discrete stages of progression, while other conditions focus on maintaining goals. Apps for pregnancy also typically don’t require manual input of health data. The popularity of pregnancy apps on Google searches are due to the advantages they have over other chronic conditions.

Medical conditions have different rates of growth on Google Trends. Pregnancy apps show the highest growth rate, while cholesterol app searches remain flat. Blood pressure apps have seen a recent increase in the last two years as more compatible home blood pressure devices have been introduced to the consumer market. New devices and wearable tech that can utilize APIs to automate health data tracking could renew interest in chronic medical conditions. Searches for diabetes apps have seen minimal growth, but as new developments allows for wireless syncing of data from insulin pumps and CGMs, search trends may increase like blood pressure apps have.

Google Trends Highlight Trends in Mobile Health

Google Trends Highlight Trends in Mobile Health

Regional Impact

Google Trends has the ability to display patterns of search trends regionally. The United States remains the leading country in searches for medical apps while Australia leads in health and fitness.

Search patterns also correlate with cultural norms. There are yearly spikes in North American searches for “Health App” during January, where New Year resolutions abound. These patterns are not as evident in Australia, despite the country leading the world in searches for fitness. Australia also shares in the practice of New Years Resolutions, but Australians are known for having a high priority in their fitness culture, which may not be affected by New Year resolutions as with Americans.

Google Trends Highlight Trends in Mobile Health 9

US searches for fitness and medical apps

Google Trends Highlight Trends in Mobile Health 10

Australian searches for fitness and medical apps

Conclusion

Consumers are showing increasing interest in using apps to manage their health and medical conditions. Google Trends is an interesting way to examine this interest through the use of their search engine. Some surprising findings were the popularity of pregnancy apps over more common medical conditions. This popularity can be attributed to millennials becoming the primary demographic for this product. It can be anticipated that as more millennials transition to an age range where chronic medical conditions are common, they will turn towards mobile health as a resource to learn and manage their new diagnoses.

Health and fitness apps saw spikes of searches in 2014 due to innovations from major smartphone developers. APIs have made it easier for developers to integrate the massive amount of data that wearables and mobile devices have been collecting. The differentiation between “health” and “fitness” apps may disappear as fitness data becomes integrated into overall health management. As evidenced in 2014, health apps will have a greater role in consumer use, especially as these platforms develop more ways to help impact health outcomes. Apple has recently partnered with the Mayo Clinic and Epic, which are potential ways to integrate health data with EHRs in a meaningful way for providers to make healthcare decisions for patients.

Regional differences may be evidence that marketing during the new year for fitness apps may hold more impact for North America but may be negligible in countries like Australia. Newer generations of users will look for apps to maintain their health and learn about how to manage new medical diagnoses. As mobile platforms find better ways to integrate social engagement, effectively use health data, and integrate with medical management, consumers and healthcare providers will have powerful tools to manage health.

Author:  David Tseng MD

Source:  http://www.imedicalapps.com

Categorized in Search Engine

It has recently been found that an officer working for the Europol agency has leaked sensitive material about the agency’s online investigations.

A televised documentary stated that it had found over 700 pages of confidential data which included terrorism investigations. The data was found on a hard drive that had been linked to the internet. The program also stated that the hard drive containing the information was not password protected. Before the documentary aired, Europol released a statement acknowledging the leak and that an investigation has been launched to find out how, and why the data became public:

Although this case relates to Europol sensitive information dating from around 10 years ago, Europol immediately informed the concerned member states. As of today, there is no indication that an investigation has been jeopardized, due to the compromise of this historical data. Europol will continue to assess the impact of the data in question, together with the concerned member states.

A reporter for the program that was aired stated that he found the information via a search engine called Shodan; a search engine that searches the Internet of Things. He also stated that there was no password needed to access the hard drive; which he did remotely through the internet.

It was also reported that the documents contained names and telephone numbers of terrorism suspects, and associates. Most of the data was from 2006 to 2008. It included the Madrid train bombing investigations, a Netherlands based Islamist terror cell called The Hofstad Network, as well as information about attacks that have been successfully stopped aboard several flights. The reporter also said that the hard drive contained information on investigations that were never made public.

Europol claims that the officer responsible for the leak had copied the files to a separate, personal hard drive against Europol’s rules; but that the officer no longer worked for the agency.

The hard drive in question was a Lenovo Lomega and the Chinese based company had released a statement saying that it is up to the owner of the drive to make it secure. Older models such as this one require the user to input a password before they can be used securely.

Dr. Bibi van Ginkel, a senior researcher with the Netherlands Institute of International Relations, thinks a leak containing data such as this one could have negative consequences:

Police organizations never want to reveal how much they know to prevent bad guys from understanding how the police operate and infiltrate them. In times that better international-cooperation and data exchange is needed, this leak might jeopardize the trust between states.

Europol Director Rob Wainwright announced that in light of this investigation he will be attending a seminar in London this January to learn more about data protection and online privacy practices.

Author:  AMERICAN GUERRILLA

Source:  https://www.deepdotweb.com

Categorized in Deep Web

With nothing more than a standard Web browser, cybercriminals can find personal, private information all over the public Internet. It isn't just legitimate services - from genealogy sites to public records and social media - that can be mined and exploited for nefarious purposes. Openly malicious criminal activities are also happening on the public Internet.

 

True, much of the cybercrime underground consists of private and established communities that don't appear in a normal search engine and are not accessible by regular users without special authorization.

 

However, according to the team at identity protection and fraud detection provider CSID, there are different levels of cybercriminal resources - and not all are so tightly protected. The quality and quantity of the more easily accessible forums are still high, say the CSID team, and anyone can access content such as stolen credit cards, cyberattack tools, and even advanced malware, which can be leveraged with minimal technical know-how required.

 

Adam Tyler, chief innovation officer at CSID, describes how black-market organizations are becoming more like traditional online businesses we visit and buy from every day. “For example," he says, "many sites now have their own Facebook, Twitter and even YouTube pages to advise their member base on new attacks and tools that are available.”

 

 

 

 

Data sold on criminal marketplaces “age quickly, meaning that once the information is stolen, it has to be used for fraudulent purposes quickly,” says Christopher Doman, consulting analyst at Vectra Networks. “The more times the information is abused for fraud, the more the information will be devalued.”

 

“Companies should have these marketplaces monitored, looking for trends in data breaches and attacks as well as to see if any of their data has been compromised,” says Carefree Solutions’s CEO Paul San Soucie. “One point that I’m not sure is evident is that there is more public and Dark Web research than any one IT person can handle. Researching and absorbing this information requires significant training and experience. Even large US banks that have dedicated security staff are not able to do some of the research and analysis that specialized reconnaissance teams can perform.”

 

San Soucie nevertheless suggests treading carefully when doing this research. "While you can get to most of these sites using standard https, I still consider them dark and strongly recommend accessing them via a VPN as both criminal and government sources track access in some cases.”

 

Read on for a collection of some of the popular sites where private data, credentials, and attack tools are up for sale, or even for free download.

 

Bonus Source: Novice Cybercrime Communities

Social sites, communities, marketplaces and other places for people new to the cybercrime underground to learn their craft have become increasingly available, easy to find, and easy to use, even for the most novice user.

'The introduction of low cost-domains, the availability of cheap shared web hosting, and the large number of free-to-use open-source community platforms has enabled fraudsters to easily set up and run dark web communities in a matter of a few minutes,' says Tyler. 'This has led to a huge explosion in the number of communities that are accessible and available, even for those hunting for information via a search engine.'

Image Source: CSID

 

Bonus Source: Novice Cybercrime Communities

 

Social sites, communities, marketplaces and other places for people new to the cybercrime underground to learn their craft have become increasingly available, easy to find, and easy to use, even for the most novice user.

 

“The introduction of low cost-domains, the availability of cheap shared web hosting, and the large number of free-to-use open-source community platforms has enabled fraudsters to easily set up and run dark web communities in a matter of a few minutes,” says Tyler. “This has led to a huge explosion in the number of communities that are accessible and available, even for those hunting for information via a search engine.”

 

AlphaBay Market and Forum

AlphaBay, founded in 2014 by alpha02 (a well-known carder) and DeSnake, has become the most popular cybercrime market in 2016, since some competitive sites have shut down. This market emulates popular e-commerce sites like eBay or Amazon in appearance, navigation, and features, and accept digital currency like Bitcoin. 

Yet, these customers aren't shopping for best-selling books, vintage watches, groceries or diapers; rather they are browsing the selection of tens of thousands of items offered by AlphaBay for items related to drugs, malware, exploits, hacked accounts, stolen credentials, and other illicit goods and services - including hacking services.

AlphaBay is better concealed and harder to access than some of the sites on this list; much of it cannot be found through a Google search. It is located on the unindexed, encrypted segment of Internet, the 'Dark Web,' and therefore must be accessed via the Tor network, which anonymizes all the traffic going to and from the site. 

That isn't so difficult to do, though.

'Thanks to Tor proxies, AlphaBay can be easily accessed through your normal web browser,' says Christopher Doman, consulting analyst at Vectra Networks. The Tor Browser with a pre-configured browser can be run off of a USB flash drive, for example.

'Because the information [on AlphaBay] is personally identifiable,' says Doman, 'it can be used in many ways, which include using the information as 'leads' to enable other scams and activities.'

These 'leads' may be used, for example, by:

- Craigslist sellers - to give themselves high ratings for past service
- Betting agencies - to manipulate audience voting in 'Dancing With the Stars'
- Lobbyists - to support their own causes by posting fake 'citizen' feedback


'Since AlphaBay can be easily accessed by criminals with tools such as the Tor browser, it also means that legitimate companies and researchers can also use the Tor browser to see what is for sale,' says Adam Meyer, chief security officer at SurfWatch Labs. 'Companies should be monitoring the listings for any threats that may impact their organization or those in their supply chain.'

Image Source: Carefree Solutions, SurfWatch Labs, Vectra Networks

 

AlphaBay Market and Forum

 

AlphaBay, founded in 2014 by alpha02 (a well-known carder) and DeSnake, has become the most popular cybercrime market in 2016, since some competitive sites have shut down. This market emulates popular e-commerce sites like eBay or Amazon in appearance, navigation, and features, and accept digital currency like Bitcoin.

 

 

 

 

Yet, these customers aren’t shopping for best-selling books, vintage watches, groceries or diapers; rather they are browsing the selection of tens of thousands of items offered by AlphaBay for items related to drugs, malware, exploits, hacked accounts, stolen credentials, and other illicit goods and services — including hacking services.

 

AlphaBay is better concealed and harder to access than some of the sites on this list; much of it cannot be found through a Google search. It is located on the unindexed, encrypted segment of Internet, the "Dark Web," and therefore must be accessed via the Tor network, which anonymizes all the traffic going to and from the site.

 

That isn't so difficult to do, though.

 

“Thanks to Tor proxies, AlphaBay can be easily accessed through your normal web browser,” says Christopher Doman, consulting analyst at Vectra Networks. The Tor Browser with a pre-configured browser can be run off of a USB flash drive, for example.

 

“Because the information [on AlphaBay] is personally identifiable," says Doman, "it can be used in many ways, which include using the information as ‘leads’ to enable other scams and activities.”

 

These "leads" may be used, for example, by:
  • Craigslist sellers – to give themselves high ratings for past service
  • Betting agencies – to manipulate audience voting in “Dancing With the Stars”
  • Lobbyists – to support their own causes by posting fake “citizen” feedback

 

“Since AlphaBay can be easily accessed by criminals with tools such as the Tor browser, it also means that legitimate companies and researchers can also use the Tor browser to see what is for sale,” says Adam Meyer, chief security officer at SurfWatch Labs. “Companies should be monitoring the listings for any threats that may impact their organization or those in their supply chain.”

 

Source: CardingMafia.ws

CardingMafia.ws is a carding community that provides tutorials and other information that's quite useful and valuable for fraudsters. According to the CSID team, customers can find tutorials on how to scam users, crack software, and steal credit cards.

'Visitors will also see advertisements and find direct-to-third-party suppliers of illegally obtained data, such as credit card data and PayPal account data,' says Adam Tyler, chief innovation officer at CSID. 'This is a global community that allows for collaboration on illegal tasks, giving the community the power to fully extract monetary value from its targets.'

'Malware and Trojan attacks are no longer an exclusive or technically advanced threat,' adds Tyler. 'The tools used to conduct these attacks are available to anyone with a modicum of knowledge and the ability to search online.'

(Image Source: CSID)

 

Source: CardingMafia.ws

 

CardingMafia.ws is a carding community that provides tutorials and other information that’s quite useful and valuable for fraudsters. According to the CSID team, customers can find tutorials on how to scam users, crack software, and steal credit cards.

 

"Visitors will also see advertisements and find direct-to-third-party suppliers of illegally obtained data, such as credit card data and PayPal account data,” says Adam Tyler, chief innovation officer at CSID. “This is a global community that allows for collaboration on illegal tasks, giving the community the power to fully extract monetary value from its targets.”

 

“Malware and Trojan attacks are no longer an exclusive or technically advanced threat,” adds Tyler. “The tools used to conduct these attacks are available to anyone with a modicum of knowledge and the ability to search online.”

 

DeepDotWeb

DeepDotWeb is essentially a central source for news, information, and search engine capabilities for the deep Web and its collection of criminal markets.

'While it is unclear who the owners are for this website, what is clear is that they are a group of people who want to educate people on the issues surrounding the dark Web,' says San Soucie.

The site reports on dark Web and marketplace issues. The information found on this site can be used to keep people safe while surfing or purchasing items on the dark Web. It can also be used for evil by people who are looking for illegal items or sites.

'Business should keep up with the news articles if they have concerns about their reputation or employees on the dark Web,' adds San Soucie.

(Image Source: Carefree Solutions)

 

DeepDotWeb

 

DeepDotWeb is essentially a central source for news, information, and search engine capabilities for the deep Web and its collection of criminal markets.

 

“While it is unclear who the owners are for this website, what is clear is that they are a group of people who want to educate people on the issues surrounding the dark Web,” says San Soucie.

 

 

 

 

The site reports on dark Web and marketplace issues. The information found on this site can be used to keep people safe while surfing or purchasing items on the dark Web. It can also be used for evil by people who are looking for illegal items or sites.

 

“Business should keep up with the news articles if they have concerns about their reputation or employees on the dark Web,” adds San Soucie.

 

freetrojanbotnet.com

Freetrojanbotnet.com is effectively an advanced malware distribution service that gives users access to various malware and other malicious tools for free download and use. The tools range from simple bot/rat Trojans to advanced MitB (man in the browser) variants like Zeus, Citadel, and SpyEye.

'Users can easily and freely download these packages and utilize them to conduct their own attacks,' says Tyler. 'Previously, some of the tools offered on the site were licensed for thousands of dollars every month. Now anyone can download them for free with no initial outlay or cost required.'

(Image Source: CSID)

 

freetrojanbotnet.com

 

Freetrojanbotnet.com is effectively an advanced malware distribution service that gives users access to various malware and other malicious tools for free download and use. The tools range from simple bot/rat Trojans to advanced MitB (man in the browser) variants like Zeus, Citadel, and SpyEye.

 

“Users can easily and freely download these packages and utilize them to conduct their own attacks,” says Tyler. “Previously, some of the tools offered on the site were licensed for thousands of dollars every month. Now anyone can download them for free with no initial outlay or cost required.”

 

fprvtzone.ws

Fprvtzone.ws provides both public (i.e., free) and private (paid-for) sections, where fraudsters can find tutorials on how to access data without authorization and how to use the stolen information. It is also a marketplace for individuals to sell, buy, and distribute illegally obtained data.

'Visitors can find tutorials on how to scam users, crack software, steal credit cards, and engage in various other illegal services,' says Tyler. 

Sites like fprvtzone confirm that valuable data is easily and freely accessible to nearly anyone who wants it. 'Companies need to be aware of the risks and ensure that they take steps to protect not only their personal information and accounts, but also their personal devices used to store and hold this data,' adds Tyler. 

Image Source: CSID

 

fprvtzone.ws

 

Fprvtzone.ws provides both public (i.e., free) and private (paid-for) sections, where fraudsters can find tutorials on how to access data without authorization and how to use the stolen information. It is also a marketplace for individuals to sell, buy, and distribute illegally obtained data.

 

“Visitors can find tutorials on how to scam users, crack software, steal credit cards, and engage in various other illegal services,” says Tyler.

 

 

 

 

Sites like fprvtzone confirm that valuable data is easily and freely accessible to nearly anyone who wants it. “Companies need to be aware of the risks and ensure that they take steps to protect not only their personal information and accounts, but also their personal devices used to store and hold this data,” adds Tyler.

 

HANSA Market

Created in response to the many exit scams cybercriminals have conducted over the past few years - where admins have shut down their sites, taking the hefty escrow accounts with them - HANSA is a Dark Web marketplace focused on the security of its users. 

'HANSA is claiming to side more with users in any dispute which is another attempt to get more 'buyers' to use the site,' says Meyer of SurfWatch Labs.

'The market boasts that its multi-signature escrow payment process ensures that theft from either party is impossible,' says Meyer, 'although they are not the only marketplace to offer those payment options.' 

Although HANSA vendors sell a variety of tools and information, pirated products appear most often. This includes software, video games, movies, books and other media as well as credentials to access related accounts, like online gaming platforms or Netflix.

Image Source: SurfWatch Labs

 

HANSA Market

 

Created in response to the many exit scams cybercriminals have conducted over the past few years – where admins have shut down their sites, taking the hefty escrow accounts with them – HANSA is a Dark Web marketplace focused on the security of its users.

 

“HANSA is claiming to side more with users in any dispute which is another attempt to get more 'buyers' to use the site,” says Meyer of SurfWatch Labs.

 

“The market boasts that its multi-signature escrow payment process ensures that theft from either party is impossible," says Meyer, "although they are not the only marketplace to offer those payment options."

 

Although HANSA vendors sell a variety of tools and information, pirated products appear most often. This includes software, video games, movies, books and other media as well as credentials to access related accounts, like online gaming platforms or Netflix.

 

TheRealDeal Market

TheRealDeal Market, which was launched in early 2015 by four founders, focuses on selling malicious code and exploits.

'Law enforcement operations against the cybercrime forums Hell and Darkode in July 2015 led to arrests that tied up several members of TheRealDeal team,' says Adam Meyer, chief security officer at SurfWatch Labs. 'This caused the site to shut down for a few months last year until it relaunched in December 2015 under the management of the main admin, identified as S.P., and an old vendor.'

According to Meyer, the TheRealDeal recently made headlines for the sale of massive databases of user credentials stolen from LinkedIn, MySpace, and Yahoo, as well as a number of stolen healthcare databases.

'TheRealDeal was my previous go-to site to look for data breaches and zero-day exploits,' says San Soucie. 'I found hacked federal accounts and even a state DMV database for sale.'

'Cybercriminals can also find zero-day vulnerabilities, source code, and other stolen items for sale,' adds Meyer. 'For legitimate companies and researchers, these listings provide insight into the types of information and tools that cybercriminals find valuable.'

(Image Source: SurfWatch Labs)

 

TheRealDeal Market

 

TheRealDeal Market, which was launched in early 2015 by four founders, focuses on selling malicious code and exploits.

 

“Law enforcement operations against the cybercrime forums Hell and Darkode in July 2015 led to arrests that tied up several members of TheRealDeal team,” says Adam Meyer, chief security officer at SurfWatch Labs. “This caused the site to shut down for a few months last year until it relaunched in December 2015 under the management of the main admin, identified as S.P., and an old vendor.”

 

 

 

 

According to Meyer, the TheRealDeal recently made headlines for the sale of massive databases of user credentials stolen from LinkedIn, MySpace, and Yahoo, as well as a number of stolen healthcare databases.

 

“TheRealDeal was my previous go-to site to look for data breaches and zero-day exploits,” says San Soucie. “I found hacked federal accounts and even a state DMV database for sale.”

 

“Cybercriminals can also find zero-day vulnerabilities, source code, and other stolen items for sale,” adds Meyer. “For legitimate companies and researchers, these listings provide insight into the types of information and tools that cybercriminals find valuable.”

 

Source: Siph0n

Visible on the open Internet to the general public, Siph0n - which is operated by a group that call themselves security researchers - is a source that offers web application exploits, database dumps (from LinkedIn), and malicious tools (botnet source code), among other things.

'While the group touts that it is publishing the data and tools for security awareness, many hackers follow this site to get information and source code to create exploits,' says San Soucie. 'In some cases, databases that were listed here at no cost, end up on Dark Web market places for sale.'

San Soucie suggests that business owners have their security staff or consultants monitor Siph0n closely to ensure their data does not appear. They should also watch for third-party partners' data. 

'While it may be tempting to download some of the data directly to determine if a business or individual account is listed in the data source, keep in mind that malware can be embedded in the files,' warns San Soucie.

Image Source: Carefree Solutions

 

Source: Siph0n

 

Visible on the open Internet to the general public, Siph0n – which is operated by a group that call themselves security researchers – is a source that offers web application exploits, database dumps (from LinkedIn), and malicious tools (botnet source code), among other things.

 

“While the group touts that it is publishing the data and tools for security awareness, many hackers follow this site to get information and source code to create exploits,” says San Soucie. “In some cases, databases that were listed here at no cost, end up on Dark Web market places for sale.”

 

San Soucie suggests that business owners have their security staff or consultants monitor Siph0n closely to ensure their data does not appear. They should also watch for third-party partners' data.

 

“While it may be tempting to download some of the data directly to determine if a business or individual account is listed in the data source, keep in mind that malware can be embedded in the files,” warns San Soucie.

 

 

Author:  Sean Martin

Source:  http://www.darkreading.com/

Categorized in News & Politics

With Black Friday coming up at the end of this week, there’s no more opportune time to reveal shopping data with insights into what to expect during the biggest retail season of the year.Google has done just that, providing an inside look into what the search giant expects to see this year.

Mobile Shopping Takes the Lead

In 2015, mobile shopping surpassed desktop shopping for the first time during Thanksgiving and Black Friday. Google expects that trend to continue this year, which can be looked at as a good thing whether you’re an online retailer or physical retailer. Why? According to Google, Seventy-six percent of people who search for something nearby on their smartphone visit a related business within a day.

 Women Purchase Early, Men Wait it Out

Google says women are the driving force behind the mobile web searching for and buying products at twice the rate of men throughout the holiday season. On the other hand, men are more likely to wait until the week of Christmas to complete their purchases.

Most Wanted Gifts This Season

Top trending product searches for the first two weeks of November include the Nintendo Entertainment System and Hatchimals. Here is a full list of the top trending products this year:

  • Hatchimals
  • Nintendo Entertainment System
  • Baby alive
  • Trolls
  • Dji phantom 3 + 4
  • Sony ps4 pro
  • Cozmo
  • Pokemon
  • Num Noms
  • RC cars

Busiest Shopping Times

Think everyone lines up and gets all their shopping done as soon as stores open on Black Friday? Well, not exactly. In fact, Google’s data shows that stores do not reach their busiest point in the day until well into the afternoon.When it comes to online shopping, customers are consistently shopping throughout the day, with as many as 59% of mobile shopping searches completed last year before stores even opened.For more data about mobile search trends and shopper foot traffic on Black Friday, check out Google’s complete infographic below:

Infographic- Google Black Friday Data

Author:  Matt Southern

Source:  https://www.searchenginejournal.com

Categorized in Search Engine

Harvard Business Review looked at how leading companies turn data into insights that drive marketing performance. They found that leading practitioners focus on seeing, sorting, sharing, and sparking insights to get real value from data.

In this collection of Harvard Business Review articles, brought to you by Google Surveys 360, you’ll learn:

  • What visibility across channels and touchpoints looks like in a mobile-first world.
  • Why integrating and sorting data in near-real time matters.
  • Who needs to share, understand, and learn from data-driven insights.
  • How both planning and experimentation lead to “aha” moments.

Author:  Digital Marketing Depot

Source:  http://searchengineland.com/

Categorized in Business Research

A search engine first developed in the HPC world to identify anomalies in biomedical images and then used by the military to track terrorists from UAV imagery is now being applied to the world’s vast supply of unstructured data, garnering the nickname “Facebook for Everything.”

Search was the original big data challenge (see: origins of Hadoop) and remains an instrumental part of the data analytics stack, with products like Solr and ElasticSearch continuing to attract a lot of attention and usage. And yet most search engines, like the ones powering Google and Microsoft‘s Web services, are primarily focused on enabling search and retrieval from structured content, i.e. indexing documents and Web pages.

But the volume of unstructured content, such as images, video, and audio, far exceeds the volume of structured data in the world. IDC estimates that unstructured content accounts for a 90% of all data, leaving organized words and numbers trailing far behind cat videos. With the amount of data in the world projected to grow to 40 zettabytes by 2020, that leaves a lot of data basically invisible to the traditional forms of search.

One company hoping to tap into the morass of unstructured data is DataFission. The San Jose, California firm was founded in 2013 with the goal of productizing a scale-out search engine , called the Digital Universe Search Engine, or DUSE, that it claims can index just about any piece of data, and make it searchable from any Web-enabled device.

“It’s like image search, but it’s a much more general pattern-search than that, because we can search any sort of digital data, whether it’s audio or video or image,” says DataFission’s Chief Scientist Dr. Harold Trease. “The code doesn’t care. It’s just searching for a pattern.”

High-Dimensional Feature Vectors

The DataFission product works, at a high level, just like other search engines.

First, it indexes the raw data that the client wants to search, and then places the index tables, which are 100x to 1000x smaller than the original source data, onto the DataFission server. Users can then execute searches against the tables , which is stored in NoSQL stores or HDFS, in the form of text strings or even by dragging and source images, videos, or audio files into DUSE’s search bar (or programmatically via REST APIs).

DataFission 2

The secret sauce lies in how the company indexes the data. A combination of machine learning techniques, such as principal component analysis (PCA), clustering, and classification algorithms, as well as graph link analysis and “nearest neighbord” approach  help to find associations in the data.

While the company isn’t sharing all the details about how its algorithm was built, Dr. Trease provided some general info on how it works.

“We generate a high-dimensional signature, a high-dimensional feature vector, that quantifies the information content of the data that we read through,” he says. “We’re not looking for features like dogs or cats or buildings or cars. We’re quantifying the information content related to the data that we read. That’s what we index and put in a database. Then if you pull out a cell phone and take a picture of the dog, we convert that to one of these high-dimensional signatures, and then we compare that to what’s in the database and we find the best matches.”

The software doesn’t have a notion of what is a “dog,” Dr. Trease continues, nor does it look to extract features that are associated with a dog. It’s only through the feature vector that that essential “dogness” is expressed and made available for searching and retrieving. This process works the same whether or not the source data is a cat video on YouTube, a picture of Timmy hugging Lassie, underwater audio of supertankers arriving at Long Beach Harbor, or C++ source code from a piece of malware.

DataFission 1-300x160

DUSE enables any and all pieces of unstructured data to be stored in the same   repository, enabling patterns to be detected across different data types. “It’s really good at connecting the dots,” Dr. Trease tells Datanami. “You can     discover a certain number of relationships with textual data. But if you combine   that with text, audio, and video sensor data into one big search space, then you can cross-connect across all these and it will tell you an awful lot more about connections.”

DataFission calls the information generated by DUSE’s indexing algorithm “Galaxy Plots” because, when visualized, they appear like the nighttime sky (see the image at the top of this story for an example).

“If we index a billion images, we’d end up with a billion points in this search space, and we can look at that search space it has structure to it, and the structure is fantastic,” says Dr. Trease, who’s wife, Lyn Trease, owns DataFission. “There’s all kinds these points and clusters and strands that connect things. It makes little less sense to humans, because we don’t see things like that. But to the code, it makes perfect sense.”

HPC Gov’t Roots

The patented technological underpinnings in the DataFission product trace their roots back to the 1990s, when the company’s founders focused on developing a system to automatically identify tumors and other anomalies hidden across large numbers of MRIs and other biomedical imagery.

“Then we ran into intel analysts who were watching walls of video screens,” Dr. Trease says. “They’d watch 16 screens at once for hours and we said ‘Why are you doing this? Let’s just build a tool to help you.'”

surveillance video Andrey

After getting some funding from a high performance computing (HPC) group at the Department of Energy, the technology was adopted by the intelligence community to chew through hours of video footage collected by Predator drones and other UAVs (unmanned aerial vehicles) tracking the movement of suspected     terrorists in the Middle East.

The technology helps America’s military and spy agencies solve the “needle in a haystack” types of problems. “They needed ways to be able to say that they had seen a car meet another car at a building, and they needed a way to know how many times that has happened over the last two years,” he says. “To a certain extent, people can remember a little bit. But to get it to that fidelity they needed a tool.”

The Wider Web of Things

DataFission is now seeking to broaden its reach outside of the military and intelligence communities. The timing is good, considering the rising need to analyze real-time flows of unstructured data emanating from the Internet of Things (IoT).

Indexing video is one use case. A potential client is analyzing the viability of using DataFission to index decade’s worth of film to identify product placement opportunities. Another wants to use the technology to count the number of solar panel installations in the United States.

There are many potential uses for the technology. While the military and intelligence community is able to get eyes on 5% of the data, only 1% of publicly available data is ever put in front of human, Dr. Trease says. DataFission says 88% of this so-called “Digital Universe” is video and still photos, while 10% is audio. The remaining 2% is text, but only a small fraction (about 5%) of that is indexed by Google

shutterstock_streaming data abstract_ Anteromite

“I don’t want to ding Google. I use it every day. I’m happy they’re out there,” he says. “But they are making a very small part of the Digital Universe searchable.”

The product could also be used to help cull the large amount of unstructured data flowing into an organization. DUSE could be useful for indexing large flows of unstructured data arriving via Apache Kafka queues. Because it only needs to read the source data once, the source data can be safely discarded, while its core features are safely indexed in an archive, and made available for analysis at a later time.

Cloud and On-Prem

Indexing unstructured data is a big job, to be sure, and it takes a lot of horsepower for DataFission to do run. It would take two full racks of servers a weekend to index 1PB worth of video, Dr. Trease says. And once the data is indexed, you’d want to hold onto that computing horsepower to ensure searches come back quickly. “It’s pointless to collect this data and not make it searchable,” he says.

DataFission used to rely on exotic HPC setups to provide that computing power, but today it’s relying on modern scale-out architectures consisting of 64-bit Linux clusters. The software itself, which today exists as a Python-based Apache Spark application, can be obtained as software product or fully configured on a hardware appliance called DataHunter.

D-Wave 1-300x300

The company makes use of GPU and FPGA accelerators whenever it can. “The thing can never be fast enough,” Dr. Trease says. “NVidiakeeps producing faster GPUs and Intel is adding Phi accelerators to their X86. They look pretty good. Intel just announced a hybrid X86 FPGA server.  That looks like a good way to go.” It’s also investigating DUSE running on a adiabatic quantum computer from D-Wave Systems.

These days the company is working on getting its cloud offering off the ground. There’s still some work to do, particularly around ensuring high levels of fault tolerance and resilience, Dr. Trease says. It could become available as soon as next spring.

Source:  datanami.com

Categorized in Search Engine

Good news for security teams in businesses and government organizations all around the world, Matchlight is now available for public use.

Terbium Labs has recently announced the release of the automated data intelligence system for general use.

Here is how the release of Matchlight is going to affect data theft, which is one of the building blocks of the dark web.

Matchlight

Ever since the inception of its beta version in June 2015, Matchlight sparked the interests of numerous security firms within organizations as it offered very innovative and highly effective information security measures.

Following its public release, small and medium-scaled businesses can finally catch a reprieve as it offers highly effective information security measures at a fraction of the original cost.

Prior to Matchlight, detecting an information breach on the dark web takes an average of 200 days in addition to numerous resources and the manpower required to track down leads.

In comparison, Matchlight takes a matter of minutes to detect an information breach with pinpoint accuracy and runs 24/7.

The automated data intelligence system can be privatized within organizations using data fingerprinting technology that allows the user to create a one-way digital signature in order to protect any sensitive information that is detected on the dark web.

Matchlight is based on a massive dark web search engine which scans every recess of the encrypted platform for any information it has been programmed to detect.

Matchlight poses a significant threat to the growth and continuity of dark web which is heavily based on stolen credit card information among other sensitive organizational data.

Round-the-clock monitoring and the low cost affordability of the information security software remains a tantalizing prospect especially for small and medium scale businesses with limitedresources that undergo a significant number of attacks from hackers.

Matchlight to Improve Data Breach Response Time

Matchlight is an automated intelligence system from Terbium Labs which allows a company to monitor their most critical information through a user-friendly API.
Matchlight is an automated intelligence system from Terbium Labs which allows a company to monitor their most critical information through a user-friendly API.

Data response delays can have adverse effects on an organization especially following the breach of sensitive information by hackers and other malicious parties on dark web.

 

A speedy response is the key to controlling the damage caused by the loss of an organization’s sensitive information and Matchlight seeks to drastically shorten the amount of time it takes to detect a data breach.

Organizations using the information security software will have at their disposal swifter data breach detection, round the clock monitoring and enhanced privacy which, when compared to hiring teams of data analysts and security specialists, is a lot more cheaper.

Automated System Constantly Updates as the Dark Web Expands

One notable edge Matchlight will have over tradition data breach intelligence is that the information obtained will be 100% authentic.

Digital signatures play a huge role in ensuring that the users only get alerted when fingerprints of the monitored information becomes available on the dark web.

As for the rapidly expanding dark web, the automated information security system is well-equipped to keep up with the growth of the dark web, enabling you to gain access to numerous data sources.

Better yet, organizations will benefit from the user-ready information which saves a lot of time and resources spent to crunch raw data into something that can actually be of use to the organization.

Key Features

Included in its suite of services are the following features:

  • Retrospective search.
  • Data analysis for enhanced data monitoring.
  • Live data feeds which include the monitoring of highlighted keywords, credit information and identification numbers.
  • Private exact-string fingerprint monitoring with a resolution of as low as 14 characters.

Matchlight currently attracts a monthly fee of $5 per record and enables search access for up to 600 records every month.

Terbium Labs has effectively stepped up the war against information theft and possibly commenced the decline of the dark web itself.

Source : darkwebnews

Categorized in Deep Web
Page 3 of 4

AOFIRS

World's leading professional association of Internet Research Specialists - We deliver Knowledge, Education, Training, and Certification in the field of Professional Online Research. The AOFIRS is considered a major contributor in improving Web Search Skills and recognizes Online Research work as a full-time occupation for those that use the Internet as their primary source of information.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.