It’s not often that marketers get to kick back and relax while customers do their job for them, but when you adopt user-generated content (UGC) as your creative, that’s how it works. Coca Cola’s “Share a Coke” campaign is a famous example where sales rose by more than 2% in the US after people began posting images of personalized Coke bottles on social media. That’s even more impressive when you consider that the boost reversed, at least temporarily, a decade-long decline in sales. And that was just organic user posts — why not take the concept further to paid advertising? The most common way that marketers use UGC is to collect and curate organically-posted social media or blog content that contains positive brand mentions or images. Brands can manually reach out to social media users and ask to use their content, but there are also a number of platforms for obtaining and deploying UGC, such as Olapic, Candid, and Taggbox. Platforms like these typically have a subscription-based mode..
In the first four parts of this series, I reviewed the free tools Bing makes available to all webmasters once you have created, logged in and verified your Bing Webmaster Tools account. Every subsequent time you log in, you get access to meaty data and an analysis of your websites’ performance, indexing, and crawling history on Bing. However, you can also use some free publicly-available tools that don’t require you to create a Bing webmaster tools account or to verify site ownership. With these free tools, you can submit information to Bing (but not track the submission or status) and access some diagnostic tools quickly and easily. Let’s take a look at each. Submit your site This tool allows you to submit a page to Bing to be discovered by our crawler. If you haven’t had a chance to create a Bing webmaster tools account yet, but you want to submit a new site or page to Bing, this is where you can go to let Bing know your site exists. With the Submit your Site tool you can specif..
Twitter confirmed this week it recently ran a test suggesting accounts to unfollow. The test lasted for only a few days, was applied to a small fraction of users, and has since ended, according to a report by Slate. Twitter would not comment on whether or not any brand accounts, or accounts belonging to high-profile personalities or politicians were included in the test; but, per Slate’s report, one user did receive a suggestion to unfollow ESPN commentator Katie Nolan, whose Twitter account has 420,000 followers. A Twitter spokesperson sent Marketing Land the following statement on the test: We know that people want a relevant Twitter timeline. One way to do this is by unfollowing people they don’t engage with regularly. We ran an incredibly limited test to surface accounts that people were not engaging with to check if they’d like to unfollow them. Twitter has taken an eagle-eye approach to making its timeline more relevant and improving the overall health of the app during the ..
All 1.7 million users of Air Canada’s mobile app have had their passwords reset by the company following a security breach which saw hackers compromise up to 20,000 accounts last week. A security notice published by the company explains that it detected “unusual login behaviour” related to the smartphone Air Canada app between August 22-24 2018, that may have seen 20,000 profiles “improperly accessed.” 20,000 profiles is – thankfully – just one per cent of the total number of users of the app, but that will be little comfort for those who have had their information compromised. That’s particularly clear when you see the range of sensitive personal information exposed by the breach, including passport details: name email address phone number Air Canada account number passport number passport country of issuance passport expiration date country of passport issuance nationality NEXUS number gender country of residence birth date The company says that credit and payment card informatio..
Facebook is taking its video hub Watch global, but even bigger news for its video creators: it is now launching Ad Breaks across five markets — the US, UK Ireland, New Zealand and Australia. The company is also rolling out its Creator Studio globally, the video management tool that includes video performance metrics. Monetizing video with 15-second Ad Breaks Pages within the designated countries that have 10,000 or more followers and have been able to generate 30,000 one-minute video views in total over the past two months will now be able to monetize their videos with the expanded release of Ad Breaks. In September, Ad Breaks will be extended to 21 more countries, including Argentina, Chile, Ecuador, France, Germany, Spain and Mexico. The in-stream ad unit runs up to 15-seconds long and includes both pre-roll and mid-roll formats, in addition to image ads displayed directly below the video, with publishers and creators earning a share of the ad revenue. Facebook has created an auto-..
Amazon is becoming a digital advertising powerhouse, with advertisers spending more than $2 billion on the platform in the last quarter alone. Whether it’s Amazon Marketing Services (AMS), Amazon Media Group (AMG) or Amazon Advertising Platform (AAP), we’re looking for feedback on whether and why you or your clients have or have not been advertising with Amazon. If not, why? If so, where are budgets coming from? Are they increasing or decreasing? How are you measuring success? We’ve put together a brief survey. It will take you about five minutes, tops. We’ll be sharing the results with readers in the coming months in various formats. As an added incentive, those who take the survey will have the opportunity to enter a drawing for a free ticket to any SMX event to be redeemed by the end of 2019. Take the survey now!
A critical remote code execution vulnerability in a Facebook server was recently patched after security researcher Daniel ‘Blaklis’ Le Gall reported it using a proof-of-concept. The vulnerability was found in an unstable Sentry service – a cross-platform application capable of collecting logs and debugging Python apps – written in Python with the Django library. Occasional crashes of the application revealed that the Django debug mode was not turned off, causing the stack traces to return information about session cookie names, options, and used serializer (Pickle). While the secret key used by Django to sign session cookies was not available in the stack trace, the security researcher was able to find an options list that revealed a key (system.secret-key) that was not snipped. “However, the SENTRY_OPTIONS list contains a key named system.secret-key, that is not snipped,” wrote Le Gall. “Quoting the Sentry documentation, system.secret-key is “a secret key used for session signing. ..
A new zero-day vulnerability was recently made public following a Tweet from @SandboxEscaper, who claimed to be frustrated with Microsoft and, apparently, their bug submission process. The tweet included a link to the proof-of-concept for the alleged zero-day vulnerability on GitHub, prompting security researchers to download and test @SandboxEscaper’s claims. Following an assessment by CERT/CC vulnerability analyst Phil Dormann, the bug was verified and confirmed to be working on a fully-patched 64-bit Windows 10 machine, enabling attackers to gain admin privileges if exploited. It’s unclear if the zero-day would work on all Microsoft supported Windows versions, including 32-bit ones, but it’s definitely cause for concern, since the PoC is publicly available and can easily be weaponized by threat actors. I’ve confirmed that this works well in a fully-patched 64-bit Windows 10 system. LPE right to SYSTEM! https://t.co/My1IevbWbz — Will Dormann (@wdormann) August 27, 2018 While th..
Strict new regulations set in place by the European Union this year are being treated rather superficially by some small and medium businesses (SMBs) in the UK, even though noncompliance can attract fines of up to 20 million euros, or 18 million pounds. Although Britain is soon to separate itself from the EU, the country still has to obey the Union’s new law (GDPR) regarding data protection until Brexit time. Only 35% of SMBs have company storage centralized with on-site servers, while 29% use cloud-based storage solutions, and 23% of SMB employees reportedly use portable storage (such as USB drives) as their primary way to store company data, according to a poll by storage solutions maker Seagate. Not only is storing company data in disparate locations highly risky, Seagate warns, it’s also time-consuming for staff sifting through documents to find what they need. As a case in point, the survey found 49% of UK SMB employees who work remotely report difficulty accessing work files ou..
The personal data of 2.3 million T-Mobile customers may have been exposed and could be up for sale following a data breach on Aug. 20. While the company did say it successfully blocked the attack and no credit card information, social security numbers, or passwords were compromised, other personal data may have been accessed. The type of information believed to have been exfiltrated by the hacker ranges from customers’ names, phone numbers, zip codes, and email addresses to account numbers and whether or not the accounts were prepaid or postpaid. “We take the security of your information very seriously and have a number of safeguards in place to protect your personal information from unauthorized access,” reads the official T-Mobile statement. “We truly regret that this incident occurred and are so sorry for any inconvenience this has caused you.” However, a security researcher claiming to have had access to some of the stolen data says hashed passwords may have also been stolen, wh..