Using the 'physical web' to boost in-store sales
Bricks and mortar businesses have been in the dark. They were blinkered to what was happening within their locations, and how customers were interacting with the space. There was huge potential to fail to engage with customers effectively, repeating marketing mistakes continuously.
Meanwhile, their online counterparts had a huge advantage -- website analytics. It gave them an expanse of data sources to explore. If they asked the right questions and found the answers, they could understand every step of their customers’ journeys. They could continually optimize their offer -- and give customers what they wanted.
The importance of in-store mobile technology
Over the last decade we’ve seen a significant increase in mobile technology and it is now becoming the heart of customer experience; forcing retailers to figure out how the digital and physical relationships can work together.
Retailers must now decide whether to equip their personnel with mobile devices, introduce more self-service kiosks or expand mobile technology even further; all in the aid of delivering a personalized approach and improving the in-store experience for shoppers.
The dangers of using public Wi-Fi hotspots
There are hundreds of thousands of free public Wi-Fi spots throughout the UK. Widespread connectivity and free accessibility are two appealing features that tempt users to open up their devices for on-the-go convenience.
However, uncontrolled access to public Wi-Fi hotspots and robust mobile security often conflict with one another. Cyber-criminals now find it increasingly easy to attack public Wi-Fi networks using Man-in-the-Middle (MitM) techniques which allow the attacker to clearly view all information transmitted across networks.
ESET discovers 'unique' self-protecting USB trojan
ESET has detected an undetectable malware. The security firm recently said to have discovered what it now calls Win32/PSW.Stealer.NAI, also known as the USB Thief.
The malware is designed to steal data and is, according to the firm, basically undetectable. It cannot be copied or reverse-engineered, making it extremely difficult to detect or analyze.
Weakening encryption severely affects our privacy
When Apple recently refused to comply with a federal court order issued by the FBI to help it break into an iPhone 5c, belonging to one of the shooters in the San Bernardino incident, a US House Judiciary Committee hearing was held.
If a ruling is made in favor of the FBI, Apple will have to weaken the encryption of its iPhone operating system, allowing the FBI to gain access to data on any iPhone. Apple’s chief executive, Tim Cook described this as the "software equivalent of cancer".
Instagram is taking advantage of Twitter's weakness
A new report on the global state of social media confirms what everyone’s been talking about lately -- Twitter is struggling and Instagram is taking full advantage of it.
The report, entitled simply "Social", is the product of GlobalWebIndex, and it is a compilation of the latest trends in social networking.
Best practices for securing your website
The web seems like a dangerous place lately, doesn’t it? We’re constantly hearing about some new piece of malware, or a website that was hacked and defaced, or a new vulnerability in what was once thought to be a secure protocol. I wouldn’t blame you for being paranoid -- after all, to hear the media tell it, your site’s under attack by criminals and ne’erdowells from all sides.
Here’s the thing -- if you’ve taken all the necessary steps to keep your site safe, you actually don’t have a whole lot to worry about. And that’s where we come in. Today, we’re going to talk about some best practices for securing your site, and protecting it against everything from infected clients to ignorant users. Let’s get started.
A different take on what DevOps is
For the last couple of years I’ve been struggling a bit with the idea of DevOps. At the root of it was my own lack of clarity about what it is. My question remained unanswered and it wasn’t for the want of trying.
I went to conferences, attended talks, read articles and met with people in our business. I gathered logically inconsistent lists of things that it was and wasn’t. In the end, I concluded that there isn’t a consensus, so I had to work out what DevOps means to me.
Tech industry sides with Apple in San Bernadino iPhone case
The tech industry is on Apple’s side when it comes to the dispute with FBI over the unlocking of the San Bernardino shooter’s iPhone.
This was, once again, confirmed through a research done by security vendor AlienVault. According to the company’s survey, which polled 1,500 IT security professionals, 33 percent support FBI, while the rest think unlocking the phone will do nothing but weaken overall product security.
Losing customer trust is a major concern for DDoS targets
The loss of trust and confidence of customers is the most damaging consequence of a DDoS (distributed denial of service) attack, a new survey by Corero Network Security says.
In the annual survey, entitled DDoS Impact Survey, losing trust is the most damaging consequence for 50 percent of those surveyed, followed by lost revenue, for 34 percent. The surveyed include IT decision makers (ITDMs), network operators and security experts that were present at the recently held RSA 2016 conference.
Uber announces bug bounty program
Uber is calling on independent computer researchers and experts to find weaknesses in its system as the transportation firm is set to release its technical map.
As Uber jumps into the bug bounty bandwagon -- a philosophy that has long been advocated by the open-source software movement -- it details its software infrastructure to the public, identifies what sorts of data might be exposed inadvertently and suggests what types of flaws are the most likely to be found.
IT pros: Security budgets are not growing fast enough
As an answer to the ever increasing threats of cyber-attacks, the security budgets across various industries are growing, a new survey by The Institute of Information Security Professionals (IISP) suggests.
However, the rise in budgets is not enough to tackle the problem.
A Brexit would be 'hugely damaging' to UK's tech industry
If Britain were to leave the European Union, that would hurt its emerging tech sector, and hurt it badly. Those are the results of a new survey conducted by recruitment agency Talent Point.
Last year, the company registered 3,347 job seekers, with 24.73 percent coming from the EU, mostly thanks to the freedom of movement within it.
French media goes on the offense against ad-blockers
French media is bringing the fight to ad blocking software. According to a report by The Guardian, a number of local outlets are preventing readers who run ad-blockers from accessing their content.
The sites, some of which are major media publications, are part of a trade association representing online businesses. They’re saying that by using ad blocking software, users are depriving the companies of valuable revenue sources, killing the business.
Keyless entry makes car theft easy
Thieves can probably steal a bunch of cars with ease, if they are equipped with keyless entry. Those are the results of a new study done by a group of German car security researchers, looking into just how secure the technology is.
According to a news report by Wired, keyless entry for cars is not secure at all. As a matter of fact, out of 24 different cars, from 19 different manufacturers, all have been easily hacked through a method of amplifying the signal from the key fob in the house.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.