The Chinese global mobile app and mobile platform development firm, Sungy Mobile, aka GOMO, may have leaked the data of over 50.5 million customers, mostly of which are children. An open port allowed independent researcher going by the pseudonym “Flash Gordon” to infiltrate the database through vulnerable IP addresses that had no login credentials. The researcher detected the flaw on May 25. The apps developed by GOMO are very popular in China, especially among kids, the company claiming more than 2 billion downloads. The data exposed information such as emails, bcrypt passwords, country of user, avatars and purchases, as well as some information of US users such as emails, username, school, gender, date of birth and their International Mobile Subscriber Identity number. Overall, some 100GB of decompressed data was exposed. Number-wise, the data exposed contained 50,553,664 unique accounts, 47,415,210 unique devices, 4,379 distinct mobile numbers in accounts, 51,426,769 distinct emai..
As paid search specialists, our strength lies in our ability to exert control over our keyword targeting. Every month or so, there are new threats to this control. We must be strong in battling this pay-per-click (PPC) kryptonite. We must build super automation to help save the world from bad PPC! That is why we at Brainlabs (my company) have created another Google Ads script, this time to help you control the impact of negative keywords. The challenge with negative keywords is getting the balance right. Too little control, and you’ll include budget-draining mismatches. Too much, and you risk losing out on potential customers. To filter traffic for high- and low-value searches, you need just the right touch. Getting the hang of it takes a bit of trial and error, but using a script to help you along doesn’t hurt. Today, I’m sharing an awesome script that will boost your phrase negative keyword matching by finding the ones you’re failing to catch due to misspellings. Using negative ke..
Responsive search ads (RSA) are the hot paid search topic of the day. They give advertisers the ability to provide Google with up to 15 headlines and four descriptions that Google can then mix and match in testing for the most effective combination of ad copy. In exchange for testing the new format, advertisers can show up to three headlines instead of two, as well as showing two 90-character descriptions instead of one 80-character description. Google recently announced the expansion of RSA formatting to regular text ads. The jury is still out as to whether RSAs will have a meaningful impact on text ad click-through rates (CTRs), but the dust is more or less settled on the last major text ad update to take the pay-per-click (PPC) world by storm: expanded text ads (ETA). New paid search blood might think nothing of the two 30-character headlines and 80 character description available through ETAs, but in (puts on spectacles) MY day, we had to make do with one 25-character headline a..
Today, I’m covering two sections of Bing Webmaster Tools, and both are very useful to anyone who wants to rank well on Bing. The two sections we will cover are: Diagnostics & Tools. Security. Diagnostics & Tools If you are interested in ranking well on Bing, this section will be particularly helpful, since this is where the SEO and keyword tools are housed. The tools here will help you identify and fix website issues to increase your overall search visibility. SEO Analyzer The SEO Analyzer is here to help you analyze individual pages for search engine optimization (SEO) performance. To get started, just enter any URL into the toolbar and click “analyze.” This is identified with the “2” bubble in the screenshot above. The SEO Analyzer can bypass the robots.txt directive and can scan any active URL on your site. This will allow you to check pages you may not want the Bingbot to actively crawl and index. If the tool encounters redirects, it will follow (to the best of its ability) th..
An Australian teenager has admitted hacking into Apple’s internal network and stealing 90 GB worth of files. The 16-year-old, who cannot be named for legal reasons, has pleaded guilty to breaking into Apple’s systems on multiple occasions over the course of a year, from his parent’s home in Melbourne’s suburbs. According to a report in The Age, the young hacker claimed to be a “fan” of the company, who “dreamed” of working for Apple one day. The teen is thought to have attempted to hide his identity using a variety of tools, such as VPN software. But after Apple eventually spotted the unauthorised access of their internal systems they informed the FBI, who in turn worked with the Australian Federal Police to track down the intruder. A search of the teenager’s home last year saw law enforcement officers seize two Apple laptops with serial numbers that “matched the serial numbers of devices which accessed the internal systems”, according to a prosecutor. In addition, a mobile phone ..
Earlier this week, the AP reported that Google continues to collect user location data even when user Location History is turned off. In response, Google initially said that the company was being clear and not hiding anything or misleading consumers: “[W]e continue to use location to improve the Google experience when they do things like perform a Google search or use Google for driving directions.” While that was all technically true, the company wasn’t being clear enough. So, according to an update from the AP this afternoon, Google has now changed some of the text on a page explaining how to “manage or delete” Location History. The new language reads: This setting does not affect other location services on your device, like Google Location Services and Find My Device. Some location data may be saved as part of your activity on other services, like Search and Maps. When you turn off Location History for your Google Account, it’s off for all devices associated with that Google Accou..
A cyber fraud ring operating across multiple states was detected by US law enforcement in February 2018, after the mother of one of the perpetrators overheard him masquerading as an AT&T employee in a phone conversation. The woman called the police and officers found a number of cell phones and SIM cards, as well as “an extensive list of names and phone numbers of people from around the world” on his computer, writes security researcher Brian Krebs. The same person was later found to be in the possession of 45 SIM cards and a Trezor Wallet used for cryptocurrency account data. After searching his home again, police found more SIM cards and driver’s licenses and passports. On the other side of the country, Florida police has arrested 25-year-old Ricky Joseph Handschumacher on money laundering and grand theft charges. The man is allegedly part of the aforementioned SIM hijacking group, which includes nine more members, who cloned phones to steal cryptocurrency. Police say that for the ..
Iranian hackers might be the next criminal group to be worried about, after the country has joined the ranks of Russia, North Korea, the US and African countries when it comes to cyberespionage operations. Research carried out by Accenture Security iDefense states that Iran has surfaced as a major security threat. “The Iranian government and hacktivists located in Iran pose a disruptive or destructive cyber threat against the United States, Europe, and the Middle East,” reads the report. The country is step-by-step turning into a focal point for cyberespionage operations, confirmed by the high number of attacks originating from Iran in the first half of 2018, specifically state-sponsored campaigns with an increased focus on other nations in the Middle East. As shown by research, Iranian hackers’ preferred method of attack is Android-based malware and ransomware launched not only against governments, but also consumers and businesses. Google Play store is almost satiated by various a..
Struggling to keep up with search algorithm updates, SERP features and evolving ad formats and platforms? It can be overwhelming. We have the solution. Get first-hand advice from Google and Bing at SMX® East, October 24-25 in NYC. Sofia, Jon, Frederic, Christi and David are ready to share actionable tactics and insights on how to build winning content and campaigns. And the keynotes are just part of what’s happening at SMX East. Check out all of the sessions, presentations, clinics, networking and workshops. See the complete agenda. Register now & save! Register by September 15 and enjoy $300 in savings on an All Access pass. In addition to the keynotes, you’ll unlock these premium benefits: The Expo Hall, featuring 20+ market-defining vendors including Amazon, Bing, Bruce Clay, Invoca and more. Structured and unstructured networking events, like our Expo Hall Reception, Birds of a Feather lunch tables, refreshment breaks and exclusive In-House SEO + SEM and Agency meetups. Top-she..
For the past few years, Amazon’s ad business has often been talked about as a sleeping giant. Well, the giant is awake and ready to stretch out. Amazon’s advertising business is just getting going, say analysts. A note to investors from Piper Jaffray finds that advertising will surpass the company’s juggernaut cloud computing business. “By 2021, we believe it is likely that advertising operating income will exceed AWS [Amazon Web Services],” analyst Michael Olson wrote Monday. Olson expects advertising income to reach $16 billion in 2021 compared to AWS at $15 billion. Amazon’s dominance in product search is driving the growth. “Being the world’s largest product search engine has its advantages and Amazon is starting to leverage them,” wrote Olson. Amazon sellers and customers alike will notice the increasing prevalence of ads in the search results on Amazon.com that drive users to product detail pages on the platform. There are more than 5 million sellers on the platform, all vyin..