Posted by Sheila Shayon on September 23, 2013 05:55 PM
Following a chaotic opening sales weekend for its new iPhone 5s and iPhone 5c, Apple reportedly sold a combined 9 million smartphones, breaking its own sales record.
The record-breaking launch marks an important step in Apple's journey back to smartphone dominance, as it recently has lost market share to rival Samsung, which is the largest mobile manufacturer in the world. But if an inventory sell-out in 24 hours says anything, it seems that Apple's one-two punch, with the advanced, fingerprint-scanning 5s and the cheaper, plastic and colorful 5c, may be paying off.
“This is our best iPhone launch yet,” CEO Tim Cook said in a press release. “The demand for the new iPhones has been incredible, and while we’ve sold out of our initial supply of iPhone 5s, stores continue to receive new iPhone shipments regularly. We appreciate everyone’s patience and are working hard to build enough new iPhones for everyone.”Continue reading...
social media watch
Posted by Sheila Shayon on May 23, 2013 05:46 PM
It’s been a big week in the twitter-verse as the micro-blogger, now transmitting close to 400 million messages a day, has made three decisive moves forward.
First, Twitter announced the implementation of a two-factor authentication technology to boost security for its users after recent hacker attacks on the Financial Times, The Onion and the Associated Press accounts. The lack of added security reached a crescendo of criticism in April when a fake tweet about a non-existent White House explosion, sent from the AP account, caused havoc in US financial markets.
The two-factor authentication feature, which is voluntary for users, sends a second, one-time log-in code via text message, making it harder for hackers to break-in to an account with just a main password. Both Jeep and Burger King have been victims as well. Criticized for not putting such measures into place earlier, a Twitter rep said the rollout was delayed due to required updates to its SMS architecture. Facebook, Google, Microsoft and Apple offer it already.Continue reading...
social media watch
Posted by Sheila Shayon on May 1, 2013 07:15 PM
All is a-twitter at the micro blogger as hacks continue to occur of high-profile accounts. In April, hackers broke into and tweeted from the accounts of CBS, NPR, and the Associated Press, posting messages that the US government was “in bed” with terrorists, and that there had been a (fake) explosion at the White House.
“That one bogus AP tweet caused the Dow Jones Industrial Average to drop 1 percent almost immediately, highlighting just how much people trust Twitter as a breaking news resource," VentureBeat points out.
A group called the Syrian Electronic Army took credit for the hacks, but the potential for other copycats is so great, Twitter is urging companies not to share passwords in emails or over the Internet and to limit the number of people with access to the their Twitter account. The company is even advising publishers to designate one computer exclusively for tweeting. Additionally, publications are advised to use two-factor authentication on email addresses, use strong passwords and store passwords on LastPass or 1Password.Continue reading...
tech in the spotlight
Posted by Sheila Shayon on May 1, 2013 02:53 PM
As with any device that ups the ante on usage and reach, added security risks and vulnerability come hand-in-hand—and in this case, fashion issues as well.
Google has been busy hyping Google Glass, as it unleashes the futuristic specs on developers and journalists to test drive. It released a tutorial video this week, demonstrating how the glasses work.
But as developers pour over the specs of the device, several security loopholes have been discovered, causing already existing security concerns to rise. Jay Freeman, iOS and Android developer discovered that an Android hacking technique could compromise the Glass headset, gaining complete control of its operating system and potentially allowing the installation of surveillance malware.
This “Explorer” version of Glass that developers received doesn’t have a PIN code or authentication protection, so when left on and unattended, the device is vulnerable to hacking. A USB cable could be attached to the headset and used to gain full "root" access to the device, which could allow surveillance programs to be installed. Such programs could upload a user's photos, video and audio to a remote server.Continue reading...
Posted by Sheila Shayon on November 6, 2012 10:54 AM
Blooomberg reveals that the hackers spent one month “pilfering sensitive files” about Coca-Cola’s attempt to acquire China Huiyuan Juice Group for $2.4 billion. If successful, the transaction would have been the largest foreign takeover of a Chinese company ever. The breach started with malware-infected e-mails to Coca-Cola's senior executives which, when opened, enabled the hackers to infiltrate the network and steal proprietary information. Once revealed, the Huiyuan deal collapsed three days later.Continue reading...
ready for takeoff
Posted by Mark J. Miller on September 24, 2012 01:48 PM
Loews Hotels found its name in the news in recent days because the fire-alarm system of its Nashville hotel was set off by a drunken two-time Olympic gold medalist, snowboarder Shaun White. His schoolboy antics led to the whole place being evacuated and a contrite apology from the snowboarder. Not exactly the kind of security Loews wants to be known for.
Now the hotel chain is the first hospitality brand to participate in a first-of-its-kind security partnership with the U.S. Department of Homeland Security. U.S. citizens who sign on to Loews’ loyalty-rewards program, YouFirst Platinum, gain complimentary enrollment into the DHS’s Global Entry program and allows guests to expedite airport screening with TSA PreCheck.
"Partnerships are integral to the way we do business as a brand," stated Loews Chairman Jonathan Tisch. "Our collaboration highlights the importance of the public and private sectors working together to improve hospitality for all our guests, whether that be at our hotels or traveling through an airport."Continue reading...
what becomes a legend most?
Posted by Shirley Brady on August 22, 2012 04:11 PM
Cisco has taken on historical themes before, imagining Paul Revere with a Cisco Cius tablet and an updated Braveheart in the office. Above, its new video evokes Helen of Troy vs. hackers insides a Trojan horse virus, a means to communicate the brand's value protecting small business networks. Tagline: "The right network changes everything."
Posted by Sheila Shayon on August 1, 2012 09:53 AM
Thomson Reuters’ acquisition of MarkMonitor underscores the increasing threat to brands from digital piracy. With Internet commerce accounting for more than 20% of GDP growth in mature countries, piracy and counterfeiting are costing companies more than $600 billion per year.
The San Francisco-based MarkMonitor uses a SaaS delivery model, providing technology and expertise to protect revenue and reputation for more than half of Fortune 100 businesses.Continue reading...