AI of Things Feel Free to browse: How online retailers are driving sales with sponsored data Leading online retailers are using sponsored data to remarkable effect: Consumers are spending more time in apps, browsing more frequently, and making more purchases. Before the internet, ‘browsing’ meant looking...
AI of Things From Automation To Inclusion: Why Banks Are Embracing Sponsored Data Content Written by David Nowicki CMO and Head of Business Development at Datami and published through LinkedIn. A wave of Sponsored Data deployments from leading retail banks is the latest in a...
AI of Things Data rewards are the new consumer engagement tool & Gigabytes are the new currency Today’s consumers are fairly savvy about companies selling to them. As they are constantly bombarded with an increasing number of calls to action, these engagement attempts are often viewed...
AI of Things Responsible data usage for effective advertising Written by Liao Yin Tung Recently The Economist stated that “The world’s most valuable resource is no longer oil, but data”. With the rise of mobile technology, traditional advertising has unsurprisingly...
AI of Things Dan Rosen talked about the importance of adopting mobile advertising: LUCA Talk 4 This past Wednesday our head of Global Advertising, Dan Rosen, gave a talk highlighting the importance of a “mobile first, mobile only” approach to advertising. Dan started by giving an...
AI of Things LUCA boosts brand engagement with “Sponsored Data” product Sponsored data is the mobile data equivalent of the toll-free telephone service where a third party or carrier pays for the customer’s access to the internet or a set...
ElevenPaths Wannacry chronicles: Messi, korean, bitcoins and ransomware last hours It is hard to say something new about Wannacry, (the ransomware itself, not the attack). But it is worth investigating how the attacker worked during last hours before the...
Florence Broderick Another month, another new rooting malware family for Android Several months ago there was a media explosion about Android-rooting malware on Google Play. Those families were discovered by Cheetah Mobile Security Research Lab, Check Point, Lookout, FireEye,...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...