2014 marketing trend: Small messages make a big impact

Taco Bell has been killing it on Twitter, creating a hip, fun presence to turn customers into evangelists.

More and more brands are marketing themselves via short-form social media like Vine, Twitter, Instagram, Instagram video and the newer platform Snapchat. They are not marketing by broadcasting their silly old messages but by treating their prospects and customers with respect, engaging with them directly through brief snippets of conversation, personality and humor. But it’s not just for fun: Consumers who engage with brands via social media demonstrate a deeper emotional commitment to those brands and spend 20 to 40 percent more than other customers, according to a report from Bain & Company.

 

 

Continue reading… “2014 marketing trend: Small messages make a big impact”

0

Russian Spy Ring Passed Secret Messages Using Digital Steganography

steganographic

A message is embedded in the right image using steganography.

Invisible ink, buried money and radio transmission: in many ways it seems the Russian spy ring recently apprehended by the US Department of Justice (DOJ) took its cues from old-school Soviet operatives. With one notable exception: in the case of the classic spy “dead drop” – a location used to secretly pass items between two people – these spies went digital.

 

Continue reading… “Russian Spy Ring Passed Secret Messages Using Digital Steganography”

0

TXTBlocker: Stops Texting While Driving

txtblocker_small

TXTBlocker

TXTBlocker is a software and online service combo which locks off a registered mobile phone from making or receiving text messages or calls while in a car. It uses cell and GPS data to determine location and speed and decide whether the phone is actually in a car, and once it thinks it is, boom, the service is automatically limited.

 

Continue reading… “TXTBlocker: Stops Texting While Driving”

0

Three Researchers From Microsoft Find Way To Trace Malicious Users

malicious

Microsoft team find a way to trace compromised machines used to attack other computers

Anonymity on the Internet can be both a blessing and a curse. While the ability to hide behind anonymous proxies and fast-changing Internet protocol (IP) addresses has enabled freer speech in nations with repressive regimes, the same technologies allow cybercriminals to hide their tracks and pass off malicious code and spam for legitimate communications.

Continue reading… “Three Researchers From Microsoft Find Way To Trace Malicious Users”

0