target

  • Recently, the US Department of Justice levied an indictment against three North Korean military hackers for their role in cyber-related crimes (see video below). These included (but not limited to): Targeting of and Cyberattacks on the Entertainment Industry: Such as the destructive cyberattack on Sony Pictures Entertainment in November 2014 in retaliation for the farcical movie The Interview. Cyber-Enabled Heists from Banks: Attempts to steal more than $1.2 billion from banks in Vietnam, Bangladesh, Taiwan, Mexico, Malta and Africa. Creation and Deployment of Malicious Cryptocurrency Applications: Development of multiple malicious cryptocurrency applications including Celas Trade Pro, WorldBit-Bot, iCryptoFx, Union Crypto Trader, and more, which would provide the North Korean hackers a backdoor into the victims’ computers. Spear-Phishing Campaigns: Multiple spear-phishing campaigns that targeted employees of United States cleared defense contractors, energy companies, aerospace companies, technology companies, and more. Ransomware and Cyber-Enabled Extortion: Creation of the destructive WannaCry 2.0 ransomware in May 2017, and the extortion and attempted extortion of victim companies involving the theft of sensitive data and deployment of other ransomware. And it is to that last point that I thought a brief discussion on Ransomware would be warranted. Even Digital Batman’s own father was a victim of a ransomware attack that left him $400 poorer! In 2019 over 187.9 million users were affected by this bold malicious threat to online activities such as web‐surfing, e-commerce, gaming, and more. Put simply, this highly‐disruptive form of Internet‐viral malicious software (malware for short), not only infects your computer but holds all of your most precious files (i.e. photos, documents, apps, etc.) completely hostage—via permanently encrypting such files—until the victim is forced to pay a “ransom” to the criminal entity behind the attack for a decryption key to unlock the files. Usually to the tune of $100 ‐ $400 or more for...
  • January 24, 2020

    Long Live the Browser Wars!

    Google recently announced that it was going to strip cookies from its Chrome web-browser. This is a big deal for a lot of people, namely advertisers. In case you weren’t aware of what a cookie is (not the yummy kind you eat), let Digital Batman tell you. A cookie is a bit of third-party data that gets stored on your system when you access a website. This data is used to track your online activities such as product browsing history, location, etc. Advertisers can then use this data to target ads specifically to what they think you’re interested in. And furthermore, advertisers can “retarget” ads after you as you browse around the Internet from site to site. Ever wonder how a random website you visit seems to know that you were looking at plushy chairs on Amazon? Well, that’s retargeting and that’s powered by cookies. Which leads to a lot of privacy issues that have been debated for as long as the Internet has been around. Therefore, Google is trying to assuage users’ concerns about privacy by eliminating cookies. What will advertisers do? Well, they’ll probably have to come up with more transparent ways to gather your information, with your permission. Now I mention this because it reminds me about how things have both changed and remained the same over the last 25+ years of browsing the Internet. Back in the heyday of the World Wide Web (mid-to-late 1990s), we had a whole battlefield of web browsers all vying for dominance in The Browser Wars! It all started with Netscape Navigator (technically Mosaic in its initial form), invented by Marc Andreessen founder of Netscape. [Digital Batman had done a previous Progressive Pioneers profile on Andreessen back in July.] Navigator was initially released in December of 1994. It sported a simple interface with a few oversized navigation buttons (like Back, Home, and...
  • Email Marketing is essentially a hand-shake agreement between the marketer and the end user/customer that says, “I have a product or service that I would like to you check out, and you have graciously agreed to let me show it to you.” If the end user/customer has not opted-in (i.e. agreed to receive emails from the marketer, and instead receives a flood of unwanted emails (i.e. spam)), then there is no trust whatsoever from the end user/customer of the marketer. With no trust, there is no open rate on the carefully crafted marketing emails, which means it is all just a waste of everyone’s time. Establishing trust between the two is essential for a successful email marketing campaign. That begins with an easy opt-in process for interested customers (or clientele). The following is a short list of six best practices in which to build an effective email marketing strategy. Easy Opt-In for Customers Your company’s website should have a spot on its homepage that allows interested parties to opt-in (or subscribe) to your monthly newsletter, job search tips, and resources emails. Created with a widget for a website homepage such as MailChimp’s WordPress Widget, this plug-in app allows visitors to a website to effortlessly and legitimately add themselves to your email mailing list. Thereby establishing trust between the potential new clients and your company because now these emails are desired. And by extension, also make it easy for subscribers to opt-out or unsubscribe because it is illegal to keep them on the list if they do not want to be there. Define Your Customer Base This may seem obvious but many organizations take a generalized approach to appealing to the lowest common denominator. Collecting random leads from email lists are pointless unless they are specific to your industry and are a high-value opportunity for new business. Ask yourself the...