This tag contains 2 private blog which isn't listed here.
One of the biggest online shopping days in China is coming up this November 11 – and it's one that brands should prepare for. Single's Day is a popular festival for young Chinese people that has become a massive shopping event on Chinese marketplaces. In 2014, Alibaba sold $14.3 billion of goods from 278 million orders on Singles Day. To put that into perspective, Amazon processed just 37 million orders on America's Cyber Monday that year. With this massive sales volume in Chinese marketplaces on the horizon, here's a few tips on how brands can be vigilant against counterfeiters this 11/11:... Read More
Business Email Compromise (BEC) scams are impersonation emails sent to selected recipients – often a CFO or assistant, that appear to be from a CEO – requesting an immediate wire transfer with attached account details. According to the FBI, thieves stole nearly $740 million in such scams from more than 7,000 victim companies in the U.S. between October 2013 and August 2015. Vistaprint, a web services company, has unwillingly become a conduit for increasing email scams by promoting a free one month trial of their Website Builder product. This is a great deal for the Vistaprint user: they can choose a... Read More
Traditionally, the financial industry has always been a primary target for phishing attacks. And so far, that trend seems to remain true. In the first half of 2015, 41% of the phishing attacks targeted the financial industry. It’s still an issue and financial institutions must continue to proactively focus on their anti-fraud strategies. But here’s what I think is interesting, when we removed the financial industry from the equation and just looked at phishing trends for key non-financial industries – phishing attacks have practically quadrupled since January 2014. It’s a significant increase that is difficult to ignore. [caption id="" align="alignnone" width="731"]... Read More
By now, you’ve likely heard about the Deep Web and the Darknet – but what are they, and should brand owners be concerned about monitoring and enforcing on the nether regions of the Internet? You betcha. The Deep Web, unlike the Surface Web, is comprised of un-indexed webpages, dynamic content pages, and otherwise gated information inaccessible via a regular browsers or search engines. The Surface Web is what we would consider “regular” webpages that can be indexed by search engines. What many people don’t realize is that most of the Internet is actually in the Deep Web, and mainstream browsers will... Read More
Until recently, digital pirates have used both P2P sites and cyberlockers to upload and share pirated content. But as Internet connection speeds have increased, the piracy landscape has changed, and the appearance of streaming content has proliferated. In fact, 38% of online sporting fans are watching live streaming of their favorite events. However, the recent introduction of live streaming apps is further compounding issues surrounding online piracy, as they are quickly gaining popularity with one of these apps hitting a million users in its first ten days of availability. Although these apps have only existed for a few months, they are... Read More
Get all the latest updates
Get all the latest updates