Touchless jackpotting, making ATM’s disgorge their contents remotely


Imagine walking down the street, only to notice an ATM spewing money out of its slots and into a bag held by a shady looking character; but not in a video game.

A cybergang has been hacking the computer systems of European and Asian banks and forcing ATMs to spew out cash, warns security outfit Group IB.

In at least 14 countries including Russia, the UK, the Netherlands and Malaysia, hackers are using a program dubbed Cobalt to conduct remote logical attacks on ATMs. These attacks cause the ATM to empty itself, into the waiting hands of an accomplice who only needs to show up at the appropriate time.

As the attacks are conducted remotely the mule may have only the slightest connection to the hackers that compromised the banking system which makes them very hard to catch.

The Cobalt gang has hit unnamed banks in at least 14 countries, including Russia, the UK and Malaysia, says Group IB.

This technique called ‘touchless jackpotting’ sees them infect computer systems so that they can make ATMs spit out cash without having to manipulate the actual machines. Instead, money mules simply wait to collect the money.

ATM manufacturers NCR and Diebold Nixdorf say that they are aware of the threat. The latter’s Nicholas Billett tells Reuters: “They [the crooks] know they will be caught fairly quickly, so they stage it in such a way that they can get cash from as many ATMs as they can before they get shut down.”

This summer banks across Taiwan briefly suspended cash withdrawals from their Wincor Nixdorf ATMs after one, First Bank, revealed that crooks have stolen more than US$2 million from its machines, probably in a jackpotting operation.

Soon after police in Thailand issued a warrant for the arrest of a Russian man wanted in connection with a $350,000 jackpotting malware attack on cash machines belonging to state-run Government Savings Bank.

Dmitry Volkov, Group IB, says: “Logical attacks on ATMs are expected to become one of the key threats targeting banks: they enable cybercriminals to commit fraud remotely from anywhere globally and attack the whole ATM network without being ‘on the radar’ of security services.”

Holiday Season and Hackable Gifts

So the holiday season is finally here, along with a wide spread of hackable gifts

It’s the most wonderful time of the year, but I’m feeling anxious — security anxious, that is. Every year, we see a new round of electronic gadgets to gift during the holidays—and even indulge in ourselves. But more often than not, especially today, those tech-driven gifts requires an internet connection to work. And any internet connection has the potential to be vulnerable to cyber criminals without the proper security precautions.

I want to remind you that smart gadgets are at risk of cyber security shenanigans, and most importantly, how to protect them.

Most users know older technology like laptops, phones and desktops have vulnerabilities cyber criminals could exploit. But what they don’t know is that many devices that aren’t explicitly computers are also connected to the internet. That means they are just as vulnerable.

Web cameras, personal assistants, connected toys, fitness trackers and more need to be secured. If they’re not, holiday shoppers could find themselves unwitting participants in large-scale attacks, like previous widespread attacks on children’s toys and other family-loved technology. According to our survey, most people (81%) think it’s important that their online identity and internet-connected devices are secure this holiday season, but nearly half (47%) are unsure if they are taking the right security measures.

Here’s the breakdown of the most hackable holiday gifts this year:

Laptops and PCs

Big-ticket gifts like laptops and PCs are always popular items. They’re also always at the top of the list for cyber criminals to crack. Securing these devices isn’t difficult, though. Just make sure you activate security applications as part of the initial startup of your brand new device, and ensure you keep the software up to date.

Smartphones and Tablets

According to our survey, 52% of users plan to purchase either a smartphone or tablet this holiday shopping season. Much like their laptop and desktop brethren, these devices are vulnerable to malware and need to be protected, as well. Here, good passwords and good security practices are a must, avoiding suspicious third-party applications, and using a PIN to lock your device can help.

Media Players and Streaming Sticks

Media players and streaming sticks are a new, growing product category. They hook into just about any television and provide an easy and convenient way to watch shows, movies and more. But the security of these devices do need to be maintained. They need to be updated regularly and, if the option is available, protected by complex passwords. Fortunately, many device manufactures push automatic updates directly to these devices, but you can do a manual check depending on device and its manufacturer.

Smart Home Automation Devices and Applications

The Internet of Things (IoT), a family of devices that connect to the internet and in turn connect to each other, is a wonderful category to go to when finding a gift for a friend or family member this year. However, they are often times the most vulnerable of the holiday gift-giving bunch. Some devices have weak security standards. Others lack any security standards at all.

If you’re considering a gift under the “IoT” umbrella, then do your research. Make sure you’re aware of the security standards your device has. Read online reviews for the connected gadgets you are considering, and that you’re aware of any security shortcomings you may encounter. After all, cyber criminals have found many ways to trick smart locks, thermostats and more to use these devices in distributed denial of service attacks like a recent attack that took down many popular websites.


Finally, perhaps the hottest-ticket item of the year: drones. In fact, drone sales are expected to grow to more than $20 billion by 2020. They offer the ability to capture amazing videos, intriguing sights and are useful tools to get eyes where it’s hard to see. However, they still need to be secured. Again, using a complex password at least eight characters long with random numbers, letters and symbols is necessary for safe operation.

Regardless of what you purchase (or receive) there are a few tips and tricks to keep in mind to make sure everyone has a safe season:

  1. Change default passwords, and do an update right away. If you receive a connected gift, change the default password first and foremost. Default manufacturer passwords are rather easy for criminals to crack. Also, your device’s software will need to be updated at some point. In a lot of cases, devices will have updates waiting from them as soon as they’re taken out of the box. The first time you power up your device, you should check to see if there are any updates or patches from the manufacturer in order to ensure you’re protected from the latest threats.
  2. Secure your Wi-Fi. Any smart device will need a Wi-Fi connection to work. In order to protect what’s yours, make sure you take the time to set your Wi-Fi up with a complex password. And remember: avoid public Wi-Fi if you can—it’s often insecure, and vulnerable to penetration by bad actors.
  3. Use strong passwords, and strong PINs. Strong passwords are critical to any internet-connected device today. Make them count. Take the time to set up a robust password that’s at least eight characters long and includes uppercase letters, lowercase letters, numbers and symbols. They also need to be unique to each device and each service. Password managers, like the one included in True Key by Intel Security, are useful tools that can help generate, and keep track of, complex passwords across all your digital accounts.

So always remember to not use the same passwords across different websites or devices. If one of such places becomes compromised and your password is the same across everything, then all of your websites and devices become also compromised.

Last but not least, keep an eye on all your cards regularly to spot any suspicious transactions. And have a good credit monitoring service to alert you if anything suspicious is found.

Cyborgs are coming


Is that time for cyborgs?

Lepht Anonym wants everyone to know the door to transcending normal human capabilities is no farther away than your own kitchen. It’s just going to hurt like a sonofabitch.

Anonym is a biohacker, a woman who has spent the last several years learning how to extend her own senses by putting tiny magnets and other electronic devices under her own skin, allowing her to feel electromagnetic fields, or — if her latest project works — even magnetic north.

Since doctors won’t help her, she does it in her own apartment, sterilizing her equipment (needles, scalpels, vegetable peelers) with vodka. Good anesthetic is largely impossible to buy, so she screams a little, and sometimes passes out. But it’s worth it, for what’s on the other side.

“Bodily health takes a big fuck-off second seat to curiosity,” she says. “Though it hasn’t really changed my life, it’s just made me more curious.”

This is DIY transhumanism, the fringe of a movement that itself lies well outside the mainstream of philosophy, ethics, technology and science.

BrainGate technology is no longer the stuff of science fiction. The science of interfacing human brains and other biological neurons with computers has been developing for well over a decade and now, the progress is amazing. While the human mind is an amazing organ, that surpasses any computer ever made. Many fantasize about improving on natural skills and abilities using technology in the form of some sort of brain implant. That dream is about to become a reality. In some ways, it already has according to the BrainGate website.

“BrainGate Company’s current and planned intellectual property (the technology) is based on technology that can sense, transmit, analyze and apply the language of neurons. BrainGate consists of a sensor that is implanted on the motor cortex of the brain and a device that analyzes brain signals.”

Cyborg and biohacking research history started in 1998 with Dr. Kevin Warwick and what he called Project Cyborg according to Digital Trends. Warwick began by implanting a simple radio-frequency identification chip or RFID in his own shoulder. He planned to use this chip to adjust lighting in his office and opening doors locked to others. The experiment was successful, and so Warwick went a bit further, experimenting on himself yet again. In 2002, Warwick had a surgeon implant a BrainGate technology device.

An early BrainGate technology device, a forerunner of the technology available today, attached directly to Dr. Kevin Warwick’s arm allowing him to control a robotic hand remotely. When this was successful, Warwick had a device implanted in his wife’s arm designed to make him feel a sensation whenever she touched something. This resulted in a sort of technologically enhanced empathy or telepathy with his wife so that when she touched an object, Warwick felt the sensation in his own hand.

As a self-proclaimed cyborg, Dr. Kevin Warwick was encouraged to do a series of speaking engagements where he developed a certain demographic of followers who called themselves transhumanist enthusiasts. These transhumanists were willing to engage in self-styled, do-it-yourself biohacking. They either made the incisions themselves or employ body modification artists because most doctors refused to assist these projects.

Lepht Anonym could be considered a pet project budget, and comparing to BrainGate technology she  was a pioneer in biohacking. She believes she may have even coined that phrase. She too had her followers, who read her blog online, with increasing fascination. Lepht buys off the rack so to speak, using everyday household items and readily available technology and equipment to do her own homemade implants.

“It started when I was about 18. I was seeing expensive adverts for life-extension companies, and I would see expensive procedures that you could get only if you had a spare hundred quid. It seemed that it was all very much directed to people who had money. I wanted to do some experiments to find a way of getting the same technology out into the hands of people who didn’t have that kind of money.”

Following Anonym’s lead Tim Cannon and Shawn Sarver founded Grindhouse Wetware, determined to make human enhancement an affordable reality. Their current goal has been named Circadia. It will be an implanted device that would monitor blood oxygen, blood glucose, blood pressure, temperature and heart rate. While most scientists do not approve of ordinary people, without funding and lacking certain areas of medical expertise, attempting high tech biohacking Dr. Kevin Warwick is cautiously optimistic and even encouraging.

“I think it’s important that the artists are doing what they’re doing, because there aren’t really a whole band of scientists investigating this at the moment.”

BrainGate technology, however, is still the cutting edge of cyborg-style technology. Though currently the new innovation is being designed to help people who are paralyzed or have other nerve related mobility issues, the Braingate website admits it could be used for other applications in the future.

“Our mission is to improve on the quality of life for all disabled humans. We additionally seek to increase the usage of BrainGate related technology in both medical and non-medical applications and facilitate innovation in invasive and non-invasive brain research.”

BrainGate technology’s most recent innovation involves inserting a BrainGate sensor into the brain according to Technology Review. The hardware portion involves a small array of needle-like silicon electrodes. The sensors attach to a wireless processor designed by a company called Blackrock Microsystems.which is attached to the outside of the skull. The processor then transmits wireless signals to motorized wheelchairs, light switches, TV remote controls and a host of other gadgets designed to aid patients who are immobile according to Technology review. The processor costs about $18,000 and transmits a signal roughly as fast as an internet connection.

Human Enhancements are Lepht Anonym’s greatest concern. Or rather her greatest concern is that economic inequality would lead to a whole other level of elitism, in which economic advantage would give even more important advantages to the elite. If only the wealthy could enhance their brain activity or physical performance using expensive implants, they would become unstoppable in their superiority over the masses.

While Braingate technology is wonderful in its capacity to aid people with brain and nerve injuries and illnesses, that same technology, applied only to any one segment of the population would be tremendously unfair. That is why Lepht Anonym is searching so frantically to level that playing field. She freely admits performing surgery on herself using kitchen implements such as a potato peeler. Her work gives all new meaning to the words affordable health care. Still, even Dr. Kevin Warwick and his most avid student Ian Harrison, admit she has a valid point. Ian Harrison told Digital Trends he is in complete agreement with Anonym.

“Yes. The haves and the have-nots. That to me is a huge fear, with all of these technologies. As soon as it starts to get commercialized, you start getting this divide between people that can afford these implants and the people that can’t.”

BrainGate technology could one day give some people an enhanced human experience, that might include remote control of devices, downloads of information into a human brain or even some advantages that would mimic telekinesis or other fantastic abilities, but should these kinds of advantages only be sold to the highest bidder?

Will this technology enhance human beings with cyborg-like abilities, and will the distribution of these abilities be fair?



Preparing for Black Friday

Black Friday can be overwhelming. For the last few years, what started as the biggest shopping day of the year has steadily grown into its own season. Deals steadily appear from early November onward now, and without a shopping strategy in place, you can miss the best ones.

Fortunately, I’ve got you covered. Whether you’re shopping Black Friday in-store, online, or both, I’ve rounded up some expert strategies to ensure your shopping experience is as smooth as possible. Read on to see when to start your planning, what you should have on hand, and even a few sneaky ways to snag extra savings.


Black Friday deals often aren’t worth missing Thanksgiving dinner or tryptophan-induced slumber for. Even the National Retail Federation changed the methodology of its surveys after 2014, when 55.1% of holiday shoppers were in stores or online during the holiday weekend, down from 58.7% a year earlier.

However, it couldn’t hide the fact that spending over that holiday weekend slipped from $407 a person in 2013 to $319 in 2015. Of that 2015 figure, only $256.46 was spent on holiday gifts. It’s hard to fault Thanksgiving Day sales: The 34% of shoppers who left Thanksgiving Dinner early wasn’t that far removed from the 32% who did the same in 2013.

Online shoppers haven’t been overly enthusiastic about it, either. According to ComScore, the $1.6 billion spent online on Black Friday jumped 10% from the year before, but couldn’t match the more than $2.3 billion made on Cyber Monday and was little more than the $1.4 billion raked in on Green Monday a week later.

Meanwhile, the 9% growth of online Thanksgiving couldn’t mate the 32% growth of online sales on Thanksgiving the year before, with sales hovering around 1 billion both years. In fact, the $20 billion spent online from November 1 through November 26 last year was nearly ten times the $2.2 billion spent on Thanksgiving weekend.

A National Retail Federation survey from last October, meanwhile, found that 40% of shoppers started their holiday shopping before November, while a November 10 survey discovered that not only had 57% of consumers started their holiday shopping, but nearly 14% were more than halfway finished. Why? According to the NRF, most think it helps them spread out their spending (61.4%). Almost half (48%) choose to do so to avoid holiday crowds.

Are they worried about missing out on great deals? No. In fact, 41% are shopping early because prices and promotions are too good to pass up. However, not every item gets the royal treatment on Thanksgiving week.


If you’re hoping Black Friday will score you a discount on that dining room set or sectional you’ve been looking for, forget it. The furniture sales cycle resets in July and August, when stores are getting their next season’s offerings and pushing out last year’s stuff at a discount. If you’ve waited until November, you’ve basically waited your way out of a deal.

The same goes for patio furniture and outdoor items. Home an garden stores start clearing space in September and October to make way for holiday and Black Friday offerings — especially appliances, which are dirt cheap right now — by November. You aren’t getting that grill, table or umbrella any more cheaply than you’d get it in April.


Absolutely not Sure, you can likely still find great deals on hotel rooms, but just about every other travel expense started climbing in September and hasn’t stopped. You’re even reaching the point where those early travel “dark weeks” in January aren’t the great deals they were back in October.

Wait until January, when the holidays are over, spring break is still a long way off and both airlines and travel sites will want to fill seats and tours in the new year.


Do not pay full price for a gift card. Black Friday has a few gift card deals, but there’s no impetus for retailers to sell you some at a discount during a time when they’re already slashing prices. You could get the exact same deal by purchasing those cards now, or you could indulge in the very practice gift cards were meant to encourage: procrastination.

Let the gift-buying world spin madly on without you: retailers chop the price of gift cards dramatically in December with the knowledge that there’s very little time left to shop with them. Also, if you aren’t going to take advantage of Apple’s penchant for dramatically dropping the price of iTunes gift cards later in the holiday season, someone else will.


Oh, there will still be some deals, but retailers generally consider laptops of any stripe a back-to-school item. That means you missed your best opportunity to pick one up in September and will have to wait until July — when most schools are out and demand is low — to score a better deal.


Why? With the Xbox One S out, and Sony’s PlayStation Pro debuting in November, older versions of the One and PS4 will be bundled with games and available on the cheap. Even the PS3 will still be available new and really cheap.


Yeah, maybe once we get a discount on one technology that people are taking their time adopting, we can go plunging into the other.  Apparently there has been no discounts on an OLED set in nearly a month, and there likely isn’t one coming until next year at the earliest. We’ve just reached the stage where we have most of the country onto HDTVs and off of plasma: the replacement rate’s going to be fairly low among all but the most hardcore first adopters — and even they might sit this out until technology has caught up.


No! Again, there’s a method to this sort of thing and you upset the balance when you go looking for sweaters, jackets and coats in November.
The best deals and deepest discounts always come in January, after the more foolish shoppers have overpaid for holiday gifts. Coats will go for 50% off on Black Friday, but they’ll fetch even less if you can stay patient and wait for the best deal.


This seems like a no-brainer, right? Just wait until after the holidays. Well, we don’t blame you if you lunge for a subpar deal on Black Friday. Last year, Target offered $50 off holiday decoration purchases of $100 or more on the Saturday after Thanksgiving. That’s tremendous and it allows you to use those decorations immediately rather than shoving them into a closet, garage, basement or attic for a year. It won’t be the best deal available if it’s offered again, but there’s something to be said for instant gratification.


Gross. If you want to take up on a Black Friday offer and hand the love of your life a dead bouquet a month later, be our guest. Maybe there’s an inner Goth that might like such a thing and would be as thrilled with it as he/she is with their 100th Nightmare Before Christmas viewing of the season. However, there’s no reason to go hunting for deals on perishables this early.



The Black Friday ads of 2016 has already been leaked, so now’s a great time to start making your shopping list. Then, double-check your list as new ads are leaked. You don’t have to memorize every single page of the ads, but it’s definitely useful to know what the top offerings look like. Be sure to check out retailers you wouldn’t normally shop as well, just to make sure you’re finding all the best deals.


Black Friday has become its own season in recent years, spanning much more than a single day. (But be skeptical of anything popping up in early November.) In order to take advantage of some of the best deals, you’ll need to be prepared to shop early. You’ll find the bulk of the best offers during Black Friday week, but pay attention on Thanksgiving Day: For four years now, Turkey Day has boasted more top-tier, Editors’ Choice sales than Black Friday.

On Thanksgiving and Black Friday, some stores offer perks to the first shoppers through the door. While shopping early in the week is important, you should also be aware of early bird freebies on Thanksgiving and Black Friday. Some stores offer perks to the first shoppers through the door. For instance, last year Kohl’s gave the first 100 customers on Thanksgiving two Fandango movie tickets for free. Cabela’s handed out binoculars, smokers, coolers, and gift cards to the first 600 shoppers in line. Other stores handed out gift cards, tote bags, or even free coffee and doughnuts.


In-store shopping on Black Friday can test anyone’s patience. Sparse quantities of doorbusters and extended periods of waiting are the reasons many avoid shopping that day. Make no mistake, though — your in-store mileage may vary based on your location. Stores in highly congested areas will likely draw bigger crowds, and those in smaller towns have the potential to be far less busy. And sometimes the in-store deals are just too good to pass up.

If the thought of facing crowds fills you with despair, you might think online shopping is the easier way to go. And generally, it is. But be warned it comes with its own pitfalls. Rotating deals that sell out fast, a lack of inventory transparency, and crashing websites are all common problems. Be sure to compare the prices of shopping both in-store and online — online could offer better prices, or simply match store pricing, meaning you can avoid those chaotic crowds.


Successful Black Friday plans don’t include diving into the crowds and hoping for the best. Create a list of the items you’re shopping for, and which stores will have them. However, don’t forget to check the little things. For example, know the hours of the stores on your list — many will likely open Thursday night, and some discounts will only run for a certain amount of time. If there’s a major discount running only until 6 am, that store should take priority over others. However, very popular items like video game consoles or TV deals will need to head up your list, as those are more likely to have a limited supply in-store.


Shopping in-store on Black Friday means you’re sure to encounter at least one significant wait, so make sure you bring entertainment. Add an upbeat playlist to your phone, or download a new audiobook. That said, a good general rule is to carry only the essentials. That thermos of coffee might sound like a great idea when you’re thinking about waiting in the cold, but having to haul it around while you’re shopping will probably be more of a hassle than anything else.


While you’re standing in those long lines, why not double-check that you’re actually getting the best price? Rotating deals are huge on Black Friday, especially on sites like Amazon, so you might find even better savings online. If you do find a better price, you might get the store you’re at to match or beat it. Or simply buy the item on your phone and then duck out of that long line of cranky customers. Either way, we suggest downloading the DealNews app in order to stay on top of the latest deals on the go.


Impulse purchases can be a real problem when shopping in-store on Black Friday. You might be there for one great deal, only to see another item near the registers or by the door that seems like it’s too good to pass up. Often these “bargains” are actually unnecessary budget busters.


Many Black Friday sale items are marked “final sale — no exceptions.” But what if you bought it in the wrong color? You’re probably out of luck. Some items are returnable, but you could be hit with a restocking fee of 15% or more — especially on electronics. Be familiar with the store’s return policy before you buy.

Some final sale items are returnable, but you could be hit with a restocking fee of 15% or more — especially on electronics.


Being flexible with your shopping list is incredibly important when it comes to avoiding Black Friday disappointment. The biggest doorbusters are often in limited supply; even if you wait in line hours ahead of time, you could still miss out. It’s better to have a backup (or two) that you can grab if your first choice is gone. When you’re making your list, find similar items and you’ll already have something in mind if you aren’t able to snag your first pick.


A number of the deals you’re planning to chase on Black Friday could involve discounts in the form of mail-in rebates or store credits. Retailers tend to rely on these offers during Black Friday because they can advertise significantly discounted products, but still rake in the full price for those items.

However, redeeming those offers can be tricky for disorganized customers. Don’t let the chaos of Black Friday cost you! We suggest tucking your receipts and rebate forms into a special envelope or section of your wallet. When you’re home, create a spreadsheet with all the pertinent details for each rebate, including the product, store, dates the offers are valid, and anything else you might need in order to bag those savings.


Before You Go Before you head to the stores, make sure you’ve found all the savings you can. Look for promo codes, whether at the manufacturer’s website, a store’s website, or right here on DealNews to round up those extra discounts. If you’re shopping in-store, don’t forget to check your local paper and online circulars for printable coupons to take along, too.


Whether you prefer Facebook, Twitter, Instagram, or another platform, start following your favorite stores on social media now. Keep a close eye on these accounts, since coupons, sale previews, or even Black Friday ads can appear on social media. These can net you some serious savings on individual items or even your entire purchase, and they might be something you wouldn’t have seen otherwise.


In recent years, data breaches have become a serious worry for many shoppers. While chip-equipped credit cards are supposed to be more secure, not all retailers are able to handle EMV technology yet. Carrying cash has its own risks, especially if you’re purchasing big-ticket items.

Before you choose a card to pay with, look into the available fraud protection. It’s important to know how much you’ll be liable for if your card is stolen and used for unauthorized purchases. Be sure to see if your preferred card has an option for sending you alerts via text, email, or phone if an abnormal purchase is made. Signing up for a service like that before you start your holiday shopping could save you a headache later. Also consider which of your cards offers the best rewards, whether they’re cash back, points, or frequent flyer miles.


Which SEO strategy should I choose

The Organic SEO vs Paid SEO

SEO stands for Search Engine Optimization. SEO is all about optimizing a website for search engines like Google, Yahoo, and Bing as well as visible to users. Best SEO company will help to ensure that a website or blog is in reach of search engines with their SEO professionals.


Search Engine Optimization can improve the chances that the site will be found and ranked highly on the top by the SERP (search engines result in Page). Competition is very high today, so SEO is the best option for the firms who wants to get high traffic and increase their business boundaries on digital trends.

There are two types of search engine optimization techniques in the trends now. Both are used to get more and more traffic on your website or blog these are:
1- Organic SEO

2- Paid SEO or SEM


1-Organic SEO – The organic search engine optimization (organic SEO) means the methods used to obtain a higher ranking on a search engine results page (SERP) in unpaid or Organic, algorithm-driven results on a given search engine with specific Keywords. Two techniques follow such as on page and off page. Getting high quality back links and quality content gets a priority in search engines algorithms to rank on top. Black hat SEO technique, such as keyword stuffing and link farming, can also boost organic SEO for a short period of time.

On Page SEO

Ranking a website mostly depends upon on-page of a webpage or blog. On page, means optimize a website with basic levels like HTML tag, Meta tags, header tag, content website URL’s, sitemaps and robots.txt file as well. Best optimization practices that you can apply to the pages of your website in order to improve their ranking in search engine results.

Off Page Technique

There are top 10 good off page activities in SEO are follows:

1) Community Creation in Social Networking Sites
2) Blogging
3) Social Bookmarking
4) Business Reviews
5) Classifieds ads submissions
6) Article Submission
7) Directory Submission
8) Image Sharing
9) Video sharing
10) Search Engine Submission

2-Paid SEO – Paid SEO also Known as SEM (Search Engine Marketing). Google Ad Words, ads on Yahoo and Bing Ads are most popular paid search platforms  used by search marketers. CPM (cost-per-thousand impressions), Paid search advertising, PPC (pay-per-click) and CPC (cost-per-click) are some SEM techniques to use by search marketers.

What is good for business? Organic SEO or Paid SEO?

Both are an effective way of garnering visitors for a website, but one of them can work very well for certain situations, while with the other, you may encounter difficulties generating traffic in the same situation.Both Techniques are good as per requirements but I must tell you 70% of the links search users click on is organic – not paid.


To succeed with either one method or with both of them, marketers should know their strengths and limitations so they can be used correctly under optimal conditions.

Facebook Admits Errors and Makes Changes after Audit Finds Bugs in Metrics Reporting

Facebook has been posting big gains on the back of advertising this year, but it looks like not all is well in the world of ad metrics on the social network. Today the social network admitted that it has discovered some bugs and errors in its system that have led to misreporting numbers across four products, including Instant Articles, video and Page Insights.

In addition to working to correct the newly discovered errors, Facebook said it also plans several other changes to improve how it manages advertising metrics. Those changes include the possible addition of more third-party reviews of its reporting and the formation of a new Measurement Council of business and measurement executives.

The new errors affect how Facebook reported organic page reach over seven-day and 28-day periods, along with its metrics for completed video views, time spent by readers on Instant Articles and referrals for other apps and Web sites. Facebook noted today that the over-reporting and under-reporting errors do not affect how advertisers are billed.


This news is coming out at a key time for the company. Facebook has already been coming under pressure over accusations that it influenced the U.S. election by showing people too much “fake news” — posts created to look like factual content that were in fact made specifically to skew opinion and drive more clicks. And it had already admitted a miscalculation in September led to over-inflated video views. Shares of Facebook were down nearly three percent in pre-market trading. We’ll continue to monitor this to see whether there is a bigger effect.

The news that Facebook released today is comprised of two parts: the changes it’s putting in place, and the disclosure of the problems.

Facebook said that it uncovered bugs and other reporting errors in four products: Page Insights, its video product, Instant Articles and referrals in Analytics for Apps. For context, there are 220 metrics that Facebook counts across its platform.

One of its Pages dashboards, the summary number for 7-day or 28-day organic page reach, was miscalculated as a simple sum of daily reach instead of de-duplicating repeat visitors over those periods. It also notes that “the vast majority of reach data in the Page Insights dashboard was unaffected, including all the graphs, daily and historical reach, per-post reach, exported and API reach data, and all data on the Reach tab.” It says that the de-duplicated 7-day summary in the overview dashboard will be 33 percent lower on average and 28-day will be 55 percent lower and this bug has been live since May and will be fixed in the next few weeks. It does not affect paid reach, it added. The error area is marked here in red:


It also said that it had been under-counting metrics for completed, or 100 percent, video views — because sometimes the audio plays out longer than the video does. It notes that this could mean up to a 35 percent increase in video watches at 100 percent.

Meanwhile, Facebook said it had made a calculation error in Instant Articles, over-reporting by between 7 percent and 8 percent since August of 2015. “We were calculating the average across a histogram of time spent, instead of reflecting the total time spent reading an article divided by its total views. We have now fixed this issue,” Facebook said.

Lastly, Facebook said that it had been miscalculating Referrals in Analytics for Apps by about 6 percent for the most frequent users: it was counting clicks that went directly to apps and websites, but also clicks on posts via apps and websites, including clicks to view media. Other referral measurements were unaffected it said.

New measurement initiatives

While four problems in a pool of 220 may not seem like a lot, it’s a sign of how Facebook’s platform is getting increasingly complex. But given what a force Facebook is today in online advertising, there is also an important need for transparency and trust for those who are putting their content (and ad spend) onto the platform. And some of this is overdue, considering that Facebook has broken new ground around a whole new set of products and parameters in the digital ad market. To that end, Facebook also today announced some changes in how it’s approaching measurement.

For starters, Facebook said that it will be widening the pool of third-party companies that it works with to measure traffic and engagement on its platform beyond the small group that it works with today, which includes comScore, Moat, Nielsen and Integral Ad Science (IAS), in response to requests from partners for more independent measurement, specifically around time ads are viewed.

This will also include more work with existing partners, for example Nielsen, to monitor video and Facebook live content to incorporate that into their wider social media dashboard.

It said that it will also create a new Measurement Council — comprised of advertising clients and measurement companies — to look at how it will continue to evolve this going forward, part of a bigger plan to communicate more about its metrics publicly.

This will also include overhauling the language it uses to describe metrics, more clear calculations, more categorization and better definitions of what Facebook is measuring.

This summer, Facebook first announced it had discovered an error in how it calculated another metric on average duration of video viewing. That led to higher-than-actual measurement reports although, as with the new errors reported today, the mistake did not affect advertiser billing.

“While this is only one of the many metrics marketers look at, we take any mistake seriously,” Fischer noted in a post on the Facebook Business site in late September. “As soon as we discovered the discrepancy, we fixed it.”



Hosting Different SSL’s and same IP with IIS 8 SNI

Is it possible to host different sites with their “own” SSL certificate on a single IP address?

That has been a question I have come across frequently. Before IIS 8, you could host multiple sites needing SSL on a single IP address if the sites utilized the same SSL certificate or used a wildcard SSL certificate. A wildcard certificate was only beneficial if you needed SSL on the subdomain level of a current site/domain. But what if you had sites with different names? Well, you could get a Subject Alternative Names (SAN) SSL certificate. This SSL certificate would allow you to protect multiple sites with a single SSL certificate. The last available option prior to IIS 8 required setting each additional SSL site on the same IP address but with a different SSL port number. This would allow you to utilize each site’s/domain’s SSL on the same IP address as another site. By default, SSL certificates utilize port 443 for secure communication. This port doesn’t need to be specified in the URL since this is the standard port. When you use a different port number for SSL you will be required to add the non-standard SSL port number in the URL in order for it to work. As you can imagine, this is not the way you want to run a public site. How would a user know to enter the port number and it’s not a common step that users are familiar with doing when browsing a site.

Adding an additional IP address to host another site needing SSL is the common method used but sometimes this isn’t an option for some people. With the inception of IIS 8 on Windows Server 2012, a new feature called Server Name Identification (SNI) was added. This feature offers an easier solution to hosting multiple sites that have a different or individual SSL on a single IP address. This feature is included in IIS 8 by default and doesn’t require the installation of any additional features to begin using it. Below, I will walk through the steps involved with configuring SNI. One thing to note with implementing SNI for your SSL solution, it will not work for those users running Internet Explorer on Windows XP. If your server has multiple IP addresses, you can implement SNI for some sites in addition to assigning individual sites to a single IP address for SSL. Both methods will work along side each other on different IP addresses without issue.


1) One of the first things you will need to do is import the SSL certificates for each site on the server if this hasn’t been done already

2) Next, open IIS 8 Manager and add your first site that will need SSL
a. If the first site is already in place, proceed to step the next step

3)  After the site is added select the site and click Bindings… under the Actions menu pane on the right


4)  Click Add
a.  Select https for the Type
b.  You can leave the IP address to “All Unassigned” or choose the IP address you want to use
(If you have multiple IP’s on the server you will want to specify the one you want to use for SNI)
c.  Enter your site/domain name for Host name
d.  Check the box for “Require Server Name Indication
e.  Select the SSL certificate for the site from the drop down box
f.  Click OK


5)  Create the second site and add the SSL binding following the steps below
6)  Select Bindings and click Add
a.  Select https for the Type
b.  You can leave the IP address to “All Unassigned” or choose the IP address you want to use
(If you have multiple IP’s on the server you will want to specify the one you want to use for SNI)
c.  Enter your site/domain name for Host name
d.  Check the box for “Require Server Name Indication
e.  Select the SSL certificate for the site from the drop down box


7)  Click OK to complete the setup

That’s all that needs to be done.  Test SSL for the site to make sure each site is working properly.  If you have additional sites that need SSL added, you can continue following the steps above for adding the SSL binding for each new site.


How mind readers try to win voters

In a non-descript office in central London, young analytical minds are hard at work crunching thousands of pieces of data about every American adult.

They are a secret political weapon. A recent campaign paid more than $5 million in September alone to Cambridge Analytica, which claims it can convince voters to back him by tailoring the candidate political ads to their personalities.

Their approach combines micro-targeting, already in use in political campaigning, with psychological profiling. The company gathers up to 5,000 pieces of data about a potential voter to create a psychological profile, then adapts political ads to his or her personality and beliefs.

Using a survey usually placed on social media, the company invites users to take a personality test. The results of that test help the company group people under personality types measuring openness, conscientiousness, extraversion, agreeableness and neuroticism.

Data-crunchers then combine individuals’ personalities with their voting history, where they shop, what they buy — even what they watch on television.

The personality test doesn’t indicate that this is the purpose of the test, so it’s likely those who fill it out are unaware of how it will be matched with other data freely available or purchasable from cable and credit card companies.

With that, according to Cambridge Analytica CEO Alexander Nix, they know the best way to target the individual and what message to use.

“We can then marry this data with cookies to serve people (ads) though social media or digitally, or we can match these data to television viewing data so we can understand where the audiences are that we’re interested in, what programs they’re watching, and we can then serve them messages during those shows,” he explained.

The company does not release examples of ads it’s produced for any ongoing campaign. But it explains that for a recent candidate, one was created for a “Stoic Traditionalist” who values time in isolation, is unadventurous and tends to be unassuming in their disposition. It shows the candidate alone. The other, a “Relaxed Leader” who is sociable, generally optimistic and empathizes with the emotions of others, depicts the whole candidate family.

In the end, the data yielded “something like 160 different segments of potential voters that were separated on these personality characteristics, but also by issues, by broad attitudes about politics.

They developed 160 different tracks of digital advertising and direct mail. But those distinctions might have been unnecessarily fine.

It basically became unwieldy in the context of the campaign. The number of people that you need basically just to create all this content often offsets whatever the efficiency gain you would gain by targeting narrowly.

You probably would get a lot of the impact if you just sent the same message on gun rights to your neurotic gun rights supporters as you would to your extroverted gun rights supporters.


A drone will protect your house

Forget your old alarm system.

A new startup wants to turn drones into guardian angels for our homes. Broadband at home, motion sensors and high definition video cameras led to a renaissance in home security systems over the past decade.

But big problems remain in residential security, says Alex Pachikov, CEO and cofounder of Sunflower Labs with CTO Chris Eheim. Stationary cameras don’t detect would-be intruders until they are close or actively trying to enter the home, he said.

Palo Alto-based Sunflower Labs has raised a seed round of $2.1 million to build a “home awareness system” that monitors homes beyond the doorway, yet is easy to install.

Major home improvement retailers are selling smart cameras and smart doorbells from companies like Nest, Logitech, Ring, Canary or Oco. But these are positioned at a home’s entryways, and stationary.

The Sunflower System uses a different approach. It includes what the company is calling Smart Lights and Flying Cameras.

Its sensor-laden smart lights are solar-powered, and can detect motion, sounds and vibrations while illuminating the perimeter of a property or its walkways.

The lights communicate with a camera-equipped quadcopter. Whenever there’s uncommon activity identified by the smart lights, the quadcopter flies to where the action is, to capture video and transmit it to the cloud.

Sunflower Labs

Sunflower Labs — with headquarters in Silicon Valley and Zurich, Switzerland — announced recently this new security system that detects possible threats and investigates them with a drone.

The drone streams video to your smartphone, so you can see and decide if your home is at risk or not.

Users can ignore alerts for routine occurrences like a spouse’s car coming up the driveway or their own kids playing basketball in the driveway. But they can opt to take a deeper look at the video if something aberrant is happening.

Sunflower Labs, which is now accepting participant applications, will start beta tests in mid-2017. The startup sees itself as a complement to traditional alarms.

Home security is one of those industries where products haven’t been living up to their promise. The current systems for monitoring your whole property do not enhance your enjoyment of your home as much as they make you paranoid. By tying together really smart sensors, drones, and artificial intelligence you can have a house that looks out for itself and gives you more awareness as to what’s going on.

The Sunflower System can be reserved for $25 online today. The company plans to charge a monthly fee for its services rather than sell the hardware as a one-off.

Sunflower Labs

The Techie Details: The Sunflower Home Awareness System relies on the drone and a handful of in-ground smart lights to watch over your house. It detects motion, vibration and sound. By analyzing this data, the system can distinguish between a human, a car and animals. To do so, it uses artificial intelligence to identify the disturbance and determine if it’s potentially dangerous. For example, trusted visitors such as mail delivery persons will be recognized by how they approach the home and how long they stand at the front door.

When a person approaches and lingers outside the back door, Sunflower Labs will send a push notification to your smartphone and ask if you’d like to investigate.

If you say yes, the drone will lift off from its perch — on a balcony, deck or patio — and fly autonomously to where the suspicious person is located. The drone — 30 feet up — hovers near the visitor until you tell it to return to its nest. The app includes an option for a home owner to notify local police.

False alarms are a common problem for home alarm systems. CEO Alex Pachikov expects sending the drone to investigate before calling the police will solve this issue. The system also has the benefit of keeping an eye on all of your property. Most alarm systems are set up to guard only the entries and exits to a home.

The propellers automatically shut off if they hit anything and are designed to be quiet due to its broad size.

“Our goal is to make it a hum, as opposed to having an obnoxious buzz,” Pachikov said.

The drone currently weighs almost two pounds, but the company wants to get it down to half a pound before it ships. It also features two cameras and only collects footage of a home owner’s property to protect neighbors’ privacy.

However, the drone is sure to raise safety, privacy, nuisance and regulatory concerns. New rules,which allow operators who have passed an aeronautical exam to fly drones under 55 pounds no higher than 400 feet, went into effect for commercial drones in August. And autonomous flight isn’t legal for commercial drones.

But Sunflower Labs doesn’t see that as a problem. Since a homeowner will use the drone for non-business purposes, Pachikov doesn’t think those policies will apply. (Recreational users face fewer restrictions.)

Pachikov is working to integrate it with voice assistants such as Siri and Amazon’s Echo.

A massive cyberattack recently turned ordinary devices into weapons

A recent cyberattack that took down large swaths of the internet around the world on Friday was carried out, in part, by unsuspecting devices connected to the internet.

Affected sites included Twitter, Etsy, Github, Vox, Spotify, Airbnb, Netflix and Reddit.

Security firm Flashpoint said it believes that digital video recorders and webcams in people’s homes were taken over by malware and then, without owners’ knowledge, used to help execute the massive cyberattack.

Dyn, which manages website domains and routes internet traffic, experienced two distributed denial of service attacks on its DNS servers. A DDoS attack is an attempt to flood a website with so much traffic that it impairs normal service.

“If you take out one of these DNS service providers, you can disrupt a large number of popular online services, which is exactly what we’re seeing today,” said Jeremiah Grossman, chief of security strategy at cybersecurity startup SentinelOne.

Hundreds of thousands of devices appear to have have been infected with the malware.

The DDoS attack overwhelmed the servers of New Hampshire-based company Dyn and came in three waves 10/21/2016 starting around 7 a.m. ET. Dyn says the attack has ended.

Initially, outages were primarily impacting those on the East Coast, but by midday Friday, people in Europe were reporting outages as well.

Dyn is part of the backbone of the internet. It works as a middleman to make sure that when you type in a URL like, you get to the correct site.

As a result, throughout the day many users were unable to connect to popular platforms like Twitter, Netflix, Spotify and the Financial Times in various parts of the U.S. and Europe — mainly the American northeast and the U.K.

No one has claimed responsibility for the attack yet. A government official said the U.S. is “looking at all possible scenarios including possible cyber activity.”

On Friday afternoon, WikiLeaks posted a tweet asking its supporters to stop the DDoS attacks, although it was not immediately clear if they were behind it.

A senior government official told CNN that the DDoS attacks “mainly have resulted only in the slowing down of internet access to various websites on the East Coast.” The official believes these attacks were very crude attempts.

Software IT company Dynatrace monitors more than 150 websites, and found that 77 were impacted Friday. The disruption may have lost companies up to $110 million in revenue and sales, according to CEO John van Siclen.

The FBI said that it was “investigating all potential causes of the attack,” and the U.K.’s Home Office said it was looking into the matter.

So far, no one has pointed a finger at a particular group or nation. The methods used in Friday’s attack were very similar to the one carried out against the website of cyber researcher Brian Krebs last month, as well as French internet service provider OVH, according to Flashpoint. It’s unknown if the attacks are related.

After the cyberattack against Krebs, the source code used to carry out the strike was released online. Since then other hackers have been using the malware to carry out their own attacks.


While DDoS attacks are nothing new, research shows they’re becoming increasingly sophisticated and frequent.

Friday’s cyber-blitz demonstrated just how vulnerable the internet’s infrastructure is to these type of bombardments.

Amazon Web Services was also experiencing connectivity issues on Friday around the same time as the Dyn attacks. AWS is used by more than 1 million companies, including GE, News Corp. and Capital One.

“These [DDoS attacks] take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down,” wrote security technologist Bruce Schneier in a blog post last month.