As paid search specialists, our strength lies in our ability to exert control over our keyword targeting. Every month or so, there are new threats to this control. We must be strong in battling this pay-per-click (PPC) kryptonite. We must build super automation to help save the world from bad PPC! That is why we at Brainlabs (my company) have created another Google Ads script, this time to help you control the impact of negative keywords. The challenge with negative keywords is getting the balance right. Too little control, and you’ll include budget-draining mismatches. Too much, and you risk losing out on potential customers. To filter traffic for high- and low-value searches, you need just the right touch. Getting the hang of it takes a bit of trial and error, but using a script to help you along doesn’t hurt. Today, I’m sharing an awesome script that will boost your phrase negative keyword matching by finding the ones you’re failing to catch due to misspellings. Using negative ke..
An Australian teenager has admitted hacking into Apple’s internal network and stealing 90 GB worth of files. The 16-year-old, who cannot be named for legal reasons, has pleaded guilty to breaking into Apple’s systems on multiple occasions over the course of a year, from his parent’s home in Melbourne’s suburbs. According to a report in The Age, the young hacker claimed to be a “fan” of the company, who “dreamed” of working for Apple one day. The teen is thought to have attempted to hide his identity using a variety of tools, such as VPN software. But after Apple eventually spotted the unauthorised access of their internal systems they informed the FBI, who in turn worked with the Australian Federal Police to track down the intruder. A search of the teenager’s home last year saw law enforcement officers seize two Apple laptops with serial numbers that “matched the serial numbers of devices which accessed the internal systems”, according to a prosecutor. In addition, a mobile phone ..
Earlier this week, the AP reported that Google continues to collect user location data even when user Location History is turned off. In response, Google initially said that the company was being clear and not hiding anything or misleading consumers: “[W]e continue to use location to improve the Google experience when they do things like perform a Google search or use Google for driving directions.” While that was all technically true, the company wasn’t being clear enough. So, according to an update from the AP this afternoon, Google has now changed some of the text on a page explaining how to “manage or delete” Location History. The new language reads: This setting does not affect other location services on your device, like Google Location Services and Find My Device. Some location data may be saved as part of your activity on other services, like Search and Maps. When you turn off Location History for your Google Account, it’s off for all devices associated with that Google Accou..
A cyber fraud ring operating across multiple states was detected by US law enforcement in February 2018, after the mother of one of the perpetrators overheard him masquerading as an AT&T employee in a phone conversation. The woman called the police and officers found a number of cell phones and SIM cards, as well as “an extensive list of names and phone numbers of people from around the world” on his computer, writes security researcher Brian Krebs. The same person was later found to be in the possession of 45 SIM cards and a Trezor Wallet used for cryptocurrency account data. After searching his home again, police found more SIM cards and driver’s licenses and passports. On the other side of the country, Florida police has arrested 25-year-old Ricky Joseph Handschumacher on money laundering and grand theft charges. The man is allegedly part of the aforementioned SIM hijacking group, which includes nine more members, who cloned phones to steal cryptocurrency. Police say that for the ..
Struggling to keep up with search algorithm updates, SERP features and evolving ad formats and platforms? It can be overwhelming. We have the solution. Get first-hand advice from Google and Bing at SMX® East, October 24-25 in NYC. Sofia, Jon, Frederic, Christi and David are ready to share actionable tactics and insights on how to build winning content and campaigns. And the keynotes are just part of what’s happening at SMX East. Check out all of the sessions, presentations, clinics, networking and workshops. See the complete agenda. Register now & save! Register by September 15 and enjoy $300 in savings on an All Access pass. In addition to the keynotes, you’ll unlock these premium benefits: The Expo Hall, featuring 20+ market-defining vendors including Amazon, Bing, Bruce Clay, Invoca and more. Structured and unstructured networking events, like our Expo Hall Reception, Birds of a Feather lunch tables, refreshment breaks and exclusive In-House SEO + SEM and Agency meetups. Top-she..
For the past few years, Amazon’s ad business has often been talked about as a sleeping giant. Well, the giant is awake and ready to stretch out. Amazon’s advertising business is just getting going, say analysts. A note to investors from Piper Jaffray finds that advertising will surpass the company’s juggernaut cloud computing business. “By 2021, we believe it is likely that advertising operating income will exceed AWS [Amazon Web Services],” analyst Michael Olson wrote Monday. Olson expects advertising income to reach $16 billion in 2021 compared to AWS at $15 billion. Amazon’s dominance in product search is driving the growth. “Being the world’s largest product search engine has its advantages and Amazon is starting to leverage them,” wrote Olson. Amazon sellers and customers alike will notice the increasing prevalence of ads in the search results on Amazon.com that drive users to product detail pages on the platform. There are more than 5 million sellers on the platform, all vyin..
Apple prides itself on the airtight security offered by its family of products, including the Mac operating system, macOS. But while considerably less targeted by hackers, macOS is still vulnerable to attacks – especially when a bad actor comes at it with an exploit that takes advantage of a zero-day vulnerability. Ex-NSA hacker Patrick Wardle demonstrated just that at the Def Con conference in Vegas, when he showed that macOS High Sierra (the current version of Apple’s Mac operating system) is vulnerable to attacks involving “synthetic clicks.” macOS is rich in Accessibility features, and one of these abilities is the nifty trick of making mouse-clicks without actually touching the mouse – everything happens in the software. Wardle found that an unpatched 0-day flaw can be exploited to virtually click objects and gain access to password protected areas. In fact, he found a way to dump all passwords from the keychain and bypass 3rd-party security tools. “Via a single click, countles..
“Martech” isn’t shorthand for “marketing technology.” It’s the intersection of marketing, technology and management that fires the imagination and enables the possible: silos come down, agility increases and customer satisfaction soars. Join the community of marketing leaders who share this “grand view” at MarTech®, October 1-3 in Boston. You’ll hear more than 60 keynotes and presentations that inform and inspire from experts at leading B2B and B2C brands including Akamai, Aetna, Casper, Dropbox, IBM and more. See the complete MarTech agenda. Connect with your peers and martech solution providers Sessions and keynotes are only part of the value of attending MarTech. You’ll enjoy both structured and unstructured networking events designed to connect you with your martech tribe, including Speed Networking, the Opening Reception, the Networking Reception (sponsored by Magnolia) and Birds of a Feather lunch tables. You’ll also meet 65+ martech vendors in our Expo Hall and receive demos ..
IBM researchers are seeking to raise awareness that AI-powered threats are coming our way soon. To that end, they’ve created an all-new breed of malware to provide insights into how to reduce risks and deploy adequate countermeasures. DeepLocker was showcased at Black Hat USA 2018, the hacker conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies globally. Researchers Marc Ph. Stoecklin, Jiyong Jang, and Dhilung Kirat demonstrated how a piece of malware can be specifically targeted at one person and not others by training a neural network to recognize the victim’s face. The malware is obfuscated and hidden inside a legitimate program, in this case a video conferencing app. When the AI finds its target, it triggers the unlock key that de-obfuscates the hidden malware and executes it. For this proof of concept, they used WannaCry itself – the infamous ransomware that made headlines last year. “What is unique about DeepL..
The Tibetan diaspora has once again fallen victim to a sophisticated malware campaign similar to one detected in 2016, reports Citizen Lab after receiving the infected files from one of the targets – a Tibetan NGO. It appears the campaign was activated between January and March 2018 and bears a lot of similarity with another malware campaign that happened in 2016, both allegedly part of the Tropic Trooper campaign, when hackers targeted the governments of Taiwan and the Philippines. “The Resurfaced Campaign used different exploits and payloads than the Parliamentary Campaign but shares other connections,” reads the report. “The two campaigns used similar spear phishing messages and both targeted Tibetan parliamentarians. One of the e-mail addresses used to send spear phishing messages in the Resurfaced Campaign (tibetanparliarnent[@]yahoo.com) was also used repeatedly during the Parliamentary Campaign.” Malicious campaigns have so far targeted Tibetan activists, journalists, members..