Digital & Social Media Trends

Digital is constantly evolving. Long-term predictions are tied to technology trends, and short-term ones change as new ideas emerge on the best way to reach target audiences… to build better relationships… to find the tipping point for conversion. This post is the result of disseminating hundreds of source pages and hours of video, from agencies and businesses around the globe. It has been distilled down to a core list of digital trends and trends specific to social media, but let’s start with the broad view, move on to some relevant “trends” we saw last year, and then let’s see how the digital industry is predicting we will be over the next year.

Reports/Articles:
Econsultancy & Adobe Quarterly Digital Intelligence Briefing: 2014 Trends
Millward Brown Multi-screen global marketing trends
Forbes Digital Trends and Predictions from Thought Leaders
Forbes Top 5 Digital Trends for 2014
33 Digital and Hotwire Digital Trends Report 2013 & 2014
Experian The 2014 Digital Marketer
Emarketer Key Digital Trends for 2014 Webinar/Slides (December 2013)
Three Digital Marketing Trends for 2014 and Beyond Slides (December 2013)
Oxford economics – digital megatrends 2015
Gencom Technology – digital media trends 2015
Top Raqnk Blog 21 digital marketing trends 2015
The major marketing trends and challenges for 2014/2015 Slides
Forrester Predictions 2014: B2B COMs Will Juggle Data, Brand, and Organizational Investments
Forrester Predictions 2014: B2C CMOs Embrace the Post-Digital Landscape
Which Social Networks Should You Care About in 2014
New Trending Social Networks 2014
14 Digital and Social Media Marketing Trends for 2014
Social Media Trends 2014
Social Media Trends (from 2013) Infographic
The seven social media trends dominating 2014/2015
What Will Social Media be like in the year 2015?

Videos
Latest Digital Marketing Trends – State Of Digital Marketing 2014 – Stan Ventures
2014 Digital Marketing Trends
The sci-fi future is almost here: Marketing in 2015
The Future of Online Digital Marketing 2012 -2015
Digital Marketing Trends For 2014 And Beyond
Social Media Marketing Trends for 2014
Essential digital marketing trends for 2014 – Digital Bites

——-2——–
In December 2010, Oxford Economics conducted a study to predict trends through 2015:

2015-trends

In December 2010, Oxford Economics conducted a study to predict the trends through 2015. Oxford predicted that these four digital megatrends are going to reshape business.
1) It should be no surprise to see mobile up there. They spoke of both the growth of mobile usage by the customers/consumers, as well as by the workforce for productivity.

2) Business intelligence encompasses the consolidation of all the data on customers, competitors, and the industry/global landscape. The growth in this area is for real-time data to help understand customers and make strategic decisions.

3) Cloud computing is taking on a critical role allowing for more economical investments in technology. You’ve probably also heard it labeled as Software as a Service (SaaS). IT’s acceptance of using the “cloud” has evolved quite a bit in this time period and the workforce does not notice a difference.

4) Social media should also be no surprise, but in the industrial space they predicted the most value from internal social networks and could only see the deep value of social communication with customers for the consumer market. You’ll see as we go through detailed trends that it is always hard to predict where social will go.

Survey demographics
This global survey of 363 business executives was conducted in December 2010. Of
the respondents, 19% hailed from the US, 20% from the UK, 15% from India, 14% from
Japan, and 8% each from China, Brazil, Mexico and Australia. The survey represented
a broad range of industries, including financial services (26%); manufacturing (19%);
technology, information, communication and entertainment (18%); retailing and consumer
products (15%); and life sciences and healthcare (11%). More than half (52%) of
respondents worked at firms with revenues of more than $1bn; 25% had revenues of
$500m to $1bn; and 23% had revenues under $500m. About 46% held c-level titles; 27%
were senior vice presidents, vice presidents or directors; and 27% were heads of their
business unit or department.

——-3——–

To make this relevant, let’s look at a few trends we saw come true online in 2013.

It’s a tenant of User Experience designers everywhere, but in 2013 we saw a consistent user experience on all channels become mainstream. This includes things like websites, mobile, social, email marketing, in-store or event kiosks. Market leading companies have invested heavily in this, building templates for all types of digital interactions, with activities taking place throughout these companies to bring consistency as digital products are redesigned or new campaigns are launched.

Interactive television continues to evolve, but last year we saw many “two-screen” experiences with microsites for TV shows gaining popularity and the push for social interaction as episodes unfold.

With the popularity of social networks in daily life, businesses capitalized on leveraging social media internally to improve productivity. Technologies like Yammer and Jive led the way.

Facebook continues to have the highest levels of daily user engagement, but Instagram took second place in this stat, passing Twitter in third place.

——-4——–

Digital & Social Media Trends from 2014-2015

Let’s discuss more specific digital trends that are happening now and predicted to grow even more over the next year. These trends have been grouped into five categories: Data & Content, Mobile, Process/Operations, Search, and Social Media.

——-5——–

Data & Content

  • Variety of data-driven insights
  • Brands share the customers’ stories
  • Real-time content marketing

Trends related to data and content.

Data-driven insights are not new, but there is a shift from data volume to data variety. Data is coming from non-traditional sources like suppliers and complementary businesses, in addition to directly from customers. Lowes has recently created a data sharing portal for their suppliers that allows them to glean ongoing insights from a key audience, to not only help in engagement with suppliers, but engagement with customers.

Content has always been a key part of digital and that will never change. The trend is to tell stories that center around the user and not the product. Instead of saying X customer used X product or solution and did, this, that, and the other thing; have the customer be the voice of their own story with X product or solution in the background.

This is also driven from data, but there is a boost in real-time content marketing which references what is actually happening in the real world to create the most relevant content. The best example of this came before it even was a trend in a social ad that Oreo did about dunking the cookie in the dark when the lights went out at the 2013 Superbowl. It was timely, original, and shareable.

——-6——–

Mobile

Mobile optimization of social channels
TV’s two-screen experiences evolve
Wearable technology goes mainstream

Mobile trends.

Social networks are optimizing for mobile device usage. The newest social niche tools like SnapChat and Pheed, and still relatively new Instagram and Vine, were born for mobile devices. Others like Facebook, have been doing more to adapt to improve the user experience and to make mobile advertising available for business.

TV’s two-screen experiences have evolved to leveraging mobile and other second-screen devices to follow along with synchronized content instead of just a microsite. AMC has done this well with “story sync”. If you haven’t seen this, the sync gives deeper insights into characters and locations in the stories while you are watching. Instead of just showing a twitter hashtag on a show, social campaigns actually influence reality shows, like voting results on NBC’s The Voice where twitter voters decide who to “instantly save” in the live shows. I’ve seen this translate somewhat into the business world with questions being tweeted to a presenter at a conference – a change from the traditional Q&A style.

Wearable technology, termed “Wearables” goes mainstream. This has been in the lifestyle market for some time, with Nike fuel band, FitBit, and Jawbone allowing you to easily monitor aspects of your health and fitness. There’s also been futuristic visioning with Google Glass, but the much anticipated iWatch is coming from Apple soon. With Apple’s history of great user experience, digital enthusiasts are hoping they will crack the code on usefulness of wearables. We don’t yet know where this trend will lead, but it is the ultimate mobile device.

——-7——–

Process/Operations

Customer experience optimization with agility
Crowdsourcing expands business resources

Process/Operations-related trends.

Customer experience optimization of digital experiences, with an agile mindset, is a key trend to get closer to customers, using analytics for quick decisions and experimenting with new ideas.

Crowdsourcing becomes a standard practice to expand business resources.

——-8——–

Search

SEO (Search Engine Optimization) with conversations, mobile speed, & visuals
SEM (Search Engine Marketing) with dynamic ads and remarketing

Search trends.

SEO, Search Engine Optimization, has often been led by Google’s trends and they have moved to conversational search. Instead of focusing on ranking with keywords, Google’s new algorithm looks for the best answer to the user’s question – whatever question they ask. This switch has changed 90% of rankings and SEO will become even more important in a content marketing strategy. Mobile site speed impacts rankings, with those pages that load in under 1 second getting the best placement. Visuals are also getting better search page real estate in Google which I think is actually a response to Bing’s user experience as it grows in market share. I will mention this in the social trends, but Google+ & YouTube play their parts in SEO as well.

SEM, Search Engine Marketing, is seeing the growth in dynamic ads where the title of the ad changes to be more relevant to the search. There is also a lot more remarketing/retargeting, where return visitors are getting different ads when they return to the search page or to a website that is part of Google’s Display Network which includes 2 million publishers.

——-9——–

Social Media

Google+ is a must
A/V content is critical
Social advertising budgets increase
Twitter is key in PR

Social media trends.

There is no longer a choice for companies to join Google+ , as Google is leveraging social signals to help with relevancy in search results. Facebook and Twitter also give off social signals, but Google+ obviously has clout.

A/V content is critical. Visual content is the biggest trend in social media right now with Instagram and Pinterest usage by businesses growing (and Snapchat growing for personal use, as Snapchat users share visual content with an expiration date). Micro-video has gained speed since last year with Vine leading the genre, and Google + Hangouts and Instagram joining in. (Side note on SEO: In addition to any presence on Google+, YouTube still garners SEO rankings, as it is owned by Google.) Podcasts grow in popularity as it is easier for listeners to multi-task when listening to a podcast.

There are larger budgets for social advertising, especially with advanced targeting available. LinkedIn’s targeting for sponsored updates was released earlier this year and has a wealth of target criteria, even letting you target your audience by preferred language.

Twitter is the “newsroom of the future” and it is important to bring back the tweets that will interest journalists. (This is vastly different than the strategy advised a couple years ago where it was recommended not to push press releases in twitter because it would not engage the masses.) To make twitter a newsroom, you have to think beyond the press release though, and we have to find a balance in twitter to engage the journalists in the brief time they have to write the story, to tell our stories to the various audiences, and to have grass roots/organic engagement from the employees.

——-10——–

How can you apply these digital trends to your projects?

As with any campaign, we need to understand the audience (customer, employee, press) and then create the most relevant content (text, photos, infographics, videos) to engage them at the right time and place.
Are there new sources for this intelligence?
Is the audience leveraging mobile devices? How?
Is the audience leveraging social networks? Which?
What content will be most engaging?

You may already have been caught up in the movement of digital and used some of these trends to make your campaigns more effective this year. If so, please do share your examples here.

Here’s some guidance if you are just getting started in digital and want to know how you can apply these digital trends to your projects.

Search-related trends are self-explanatory, as we have to work on optimization for the most current search approach and take advantage of the methods employed in search advertising. After we determine who we want to reach and what our goals are for our campaign, other trends can be taken into advisement or inspire new ideas. For example, should we give customers a two-screen experience at the annual meeting during break outs with synchronized content that goes beyond the presentation?

With any campaign, we need to understand the audience, whether that is our customer, an employee, the press, or any other target audience we have, and then create the most relevant content which can be conveyed through text, photos, infographics, and videos to engage them at the right time and in the right place.

I mentioned the trend about data – are there new sources we can use for understanding the audience? Are we fully leveraging the sources we have?

Is the audience mobile? With employees, would mobile communications make them more productive? Do field engineers need content fo

r customers optimized on a mobile device, or tools that are mobile-friendly? Will customers leverage mobile ecommerce?

Is the audience leveraging social networks? Are customers gathering in small groups in LinkedIn? Are we tweeting the right information to make it easy for press coverage? Would a facebook page be the best place to engage the community we are in?

And last, but not least, what content will be most engaging for the campaign? Once you know where you are most likely to reach your target audience, and have figured out the right time to do it, creating an infographic, which is highly shareable may be the best content to leverage on LinkedIn, where a case study from the customer’s perspective may be most valuable on the website. It’s not just converting content for the different platforms, though, it is telling the story in the right way for the medium.

Security in the News – Week of April 28

Information Security

ABC News

Interpol, Philippines Bust Cyber Extortion Network

May 2

Dozens of suspected members of online extortion syndicate who duped hundreds of victims worldwide into exposing themselves in front of webcams or engaging in lewd chats.

 

BBC

Heartbleed Used to Uncover Data from Cybercriminals

April 29

Bug turned cybercriminals from attackers into victims as researchers grab material from chat rooms where they trade data.

 

Computerworld

AOL Traces Mystery Spam Flood to Security Breach; Passwords Stolen

April 28

Email addresses, encrypted passwords compromised roughly two percent of accounts.

 

Give IE Heave-Ho Until Microsoft Patches Zero-Day

April 29

Run a different browser, says cyber watchdog US-CERT.

 

Voice Phishing Scheme Lets Hackers Steal Personal Data From Banks

April 30

Cybercriminals used combo of SMS, voice phishing techniques to obtain debit card details from bank customers.

 

Target Looks to Reassure Consumers with Move to Chip and Pin

April 30

Target slates rollout of chip and pin for its payment cards for next year.

 

Help Net Security

63% of Orgs Believe They Can’t Stop Data Theft

April 30

Survey gives new insight into why cybercriminals have a foothold in the broader enterprise.

 

Network World

Phishing Attacks on Phone Customers Rising Again

April 28

Phone scams continue to plague customers.

 

PC Magazine

AOL Breach Puts Users’ Personal Info at Risk

April 28

AOL started its investigation after rise in number of spam, spoofing messages sent from user accounts.

 

Security Affairs

Kaspersky Discovered First Active Android SMS Trojan

April 28

Recently detected FakeInst, first active SMS trojan for Android targeted users in 66 countries.

 

State of Security

Target Appoints New CIO and Outlines Security Enhancements

April 29

New CIO to guide effort in wake of the massive data breach, provides details on security enhancements implemented.

 

Security Incidents Decrease, Financial Losses Nearly Double

April 29

IS breaches impacting UK businesses decreased; scale of breaches reported and impact has almost doubled.

 

Voice of Russia

Iran Speedily Advances in Cyber Attacks on US Trailing Right Behind China
April 29

Mandiant suggests major cyber espionage threat comes from China and Russia, Iran is quickly coming on.

 

Security and Crisis Management

New York Times

Putin Demands That Ukraine Pull Its Troops from Southeast

May 1

Russian president told German Chancellor that Ukraine must remove military from SE region to resolve showdown with pro-Russian militants who seized official buildings.

 

Reuters

Air Strike Kills 33 in Syria’s Aleppo: Monitoring Group

May 1

33 killed when Syrian government warplanes attacked market in rebel-controlled district of Aleppo.

 

Riot Police Clash with May Day Protesters in Istanbul

May 1

Turkish police fired tear gas, water cannon, rubber pellets to stop May Day protesters from defying Prime Minister, reaching Taksim square.

Security in the News – Week of April 21

Information Security

Computerworld

SEC Seeks Data on Cyber Security Policies at Wall Street Firms

April 21

Cyber defenses at 50 broker-dealers, investment advisers will be assessed by federal examiners.

 

Mystery Malware Infecting Jailbroken iPhones, iPads

April 23

iOS users found malicious library of unknown origin that can steal Apple credentials from iOS devices.

 

How to Keep Your Smartphone (and Data) Secure

April 24

Tips, tools can help keep your smartphone close, protect data if it strays.

 

Help Net Security

CyberRX: Healthcare Industry’s First Cyber-Attack Simulation

April 22

Results from healthcare industry’s first cyber-attack simulation.

 

Nine Patterns Make up 92 Percent of Security Incidents

April 23

92 percent of 100K security incidents analyzed over 10 years traced to nine basic attack patterns that vary from industry to industry.

 

Network World

Web Apps Security Punching Bag of Internet

April 22

Verizon’s 2014 Data Breach reports show web apps are fraudster’s best friend.

 

Security Vendor Blames Amazon for Customer Malware

April 24

Security vendor claims Amazon Web Services provided cloud-computing customer with unpatched version of Windows resulted in malware infection.

 

Ride the Lightning

Where Do You Go if You Are the Victim of a Cybercrime?

April 21

If you have been victim of cybercrime, you can visit the National White Collar Crime Center.

 

ThreatPost

Iowa State Hacked–To Mine Bitcoins

April 23

Attackers looking at college networks for another reason: computing power for Bitcoin mining.

 

Wired

It’s Insanely Easy to Hack Hospital Equipment

April 25

Many hospitals are unaware of high risk associated with devices.

 

Security and Crisis Management

BBC

Ukraine Move in Slavyansk Draws Stern Putin Warning

April 24

Ukrainian commandos moved on separatist stronghold of Slavyansk, prompting a warning of consequences from Russia’s President.

 

The Telegraph

Ukraine Helicopter Hit by Grenade Taking Off

April 25

Ukraine helicopter crippled in grenade attack as EU, US leaders conferred on final list of new sanctions.

 

Washington Post

Air Strikes Kill Dozens in Syria’s Aleppo: Monitor Group

April 21

Dozens killed in air strikes on northern Syrian city of Aleppo, including at least 29 people in single neighborhood.

 

Militants Attack Balloting Center in Iraq, Kill 10

April 23

Militants wearing military uniforms carried out attack against balloting center in remote area of country’s north, killed 10 guards.

 

Nigerian Leaders Unite Against Boko Haram

April 24

Leaders from across Nigeria appealed for united front against Boko Haram, saying Islamist insurgents were waging war on Christian and Muslim Nigerians alike.

 

3 Americans Killed in Attack on Kabul Hospital

April 24

Three American medical staff members died when Afghan security official opened fire at American-run Christian hospital in Kabul in latest violence targeting foreigners in Afghanistan.

 

Protesters Occupy Remote Oilfield in Peru

April 25

Indigenous protesters occupied Peru’s biggest oilfield in Amazon jungle near Ecuador to demand  cleanup of decades of contamination from spilled crude.

 

Yahoo News

Bomb Kills 4, Wounds 25 in Southern Pakistan

April 25

Powerful bomb exploded in upscale residential area of southern Pakistan, killing four people, wounding 25.

Security in the News – Week of April 14

Information Security

Krebs on Security

Crimeware Helps File Fraudulent Tax Returns

April 15

Cybercriminals targeting HR departments at compromised organizations, rapidly filing fraudulent federal tax returns on employees.

 

Hacker News

German Aerospace Center Targeted by Self Destructing Malware

April 14

It’s not so far when Germany confirmed its biggest Data theft in the country’s history with the usernames and passwords of 18 million email accounts stolen, compromised.

 

Help Net Security

Businesses Take Little Action to Mitigate Insider Threat

April 15

While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators.

Heartbleed Should Jumpstart Important Security Changes

April 15

With impacts on an estimated 60-70% of websites, Heartbleed is easily the security vulnerability with highest degree of potential impact ever.

 

Security of Most Popular Programming Languages

April 15

WhiteHat Security report takes deeper look into security of most popular programming languages including .Net, Java, ColdFusion, ASP and more.

 

Lateline

Australia Rates Second in Cyber-Capability

April 14

Australia is second only to the United States in cyber-capabilities in the Asia Pacific region, according to a landmark report.

 

Network World

Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab

April 15

Flawed OpenSSL Heartbleed problem is putting security firms in the hot seat.

 

State of Security

Data Breaches at Federal Agencies Doubled Over Three Years

April 15

Number of IS incidents involving exposure of personally identifiable information has more than doubled over last three years.

 

Security and Crisis Management

Aljazeera

Injuries as Blast Hits Central Cairo

April 15

Two policemen wounded in attack that targeted security checkpoint in Dokki neighborhood.

 

BBC

Nigeria Unrest: Gunmen Abduct 100 Schoolgirls

April 15

100 girls are thought to been abducted in attack on school in north-east Nigeria.

 

Belgian Emmanuel de Merode Shot in DR Congo Ambush

April 16

Belgian director of Africa’s oldest national park, Virunga in Democratic Republic of Congo, shot and wounded in ambush.

 

Latin American Tribune

Police Kill 4 Gunmen in Shootouts in Eastern Mexico

April 16

Four suspected criminals died in separate shootouts with police in port city of Veracruz.

 

Angeles Times

Nigeria Bus Station Bombing Kills 71; Boko Haram Blamed

April 14

Nigerian President blamed Boko Haram for explosion that killed scores at bus station outside capital, calling Islamic militant group an unnecessary distraction, temporary problem.

 

Reuters

Israeli Motorist Killed in West Bank Shooting: Army

April 14

An Israeli man was killed in a shooting attack on a civilian car near the city of Hebron in the occupied West Bank on Monday, the eve of the Jewish holiday of Passover.

Security in the News – Week of April 7

Information Security

Computerworld

Social Media Endangers Corporate Secrets

April 8

Employees can unintentionally share more than their employers want anyone to know.

 

Defense System

Three Ways to Deal with Insider Threats

April 7

For DOD IT teams, reality of insider threat may be far more mundane, though no less critical.

 

Forbes

Willis Insurance Predicts Energy Cyber-Attack Catastrophe Ahead

April 8

Major cyber-attack on energy industry is only a matter of time.

 

Three Effective Approaches To Corporate Security

April 9

IT security threats lurking are greater, more varied, far more insidious than ever before.

 

Fox Business

Hackers Unleash Mafia-Style Extortion Tactics

April 7

CEO received disturbing email one recent morning that would have ripple effects for his company’s 16 million users.

 

Help Net Security

CISO Challenges and Security ROI

April 7

EY Director of IS offers guidance for CISOs, discusses technical competence of company leaders, tackles security ROI, and more.

 

Emerging Trends in Cyber-Attack Methodology

April 7

Shift in complex attack trends, evolution in threat ecosystem and motivation of cyber-attacks.

 

Does IP Convergence Open You Up to Hackers?

April 7

Take steps to assure access you provide for vendors is not be abused or misused.

 

Public WiFi Users Regularly Access Sensitive Info

April 7

A considerable portion of US adults using free public WiFi say they accessed sensitive information while using it.

 

Breaches Expose 552 Million Identities in 2013

April 10

After lurking in the shadows for the first ten months of 2013, cybercriminals unleashed the most damaging series of cyberattacks in history.

 

Homeland Security News

Feds Struggle to Plug Power Grid Security Holes

April 10

Many vulnerabilities in power grid are attributable to newly adopted smart-grid technology, allows operators to transmit energy from diverse pool of resources.

 

Kai Roer

How to Build and Maintain Security Culture

April 7

Findings on security culture, slides.

 

Krebs on Security

Heartbleed Bug: What You Can Do

April 10

Many are understandably anxious to know what they can do to protect themselves; short primer.

 

Network World

Worst Data Breaches of 2014…So Far

April 8

204 through March for loss of 4,238,983 records related to sensitive information exposed through hacker cyber-attacks, stolen laptops, dumb mistakes.

 

PC Magazine

Why You Should Ditch Windows XP Now

April 1

First and foremost, this is a security issue.

 

Security Affairs

Extortion is Common Practice in Cyber Criminal Ecosystem

April 10

Extortion, ransom, blackmail are pillars of illicit activities, cyber criminals are adapting to cyber context.

 

State of Security

Russian Crime Syndicate Hacked Neiman Marcus, Many More

April 7

Russian crime syndicate identified as perpetrator of dozens of high profile attacks over seven years, lack of cooperation from authorities made dismantling group impossible.

 

Mobile Point-of-Sale Devices Easily Hacked

April 7

Banks, small and medium retailers, customers who use devices vulnerable to loss of payment card information and fraud.

 

Heartbleed Should Give You Cardiac Arrest

April 8

Of grave concern in security community on the Heartbleed vulnerability.

 

Security and Crisis Management

BBC

Pakistan Market Bomb Kills 20 in Islamabad

April 9

Deadly bomb blast struck market o outskirts of Pakistan’s capital, Islamabad, killing at least 20.

 

Los Angeles Times

Car Bomb Explodes Outside Bank of Greece

April 10

Suspected domestic terrorists exploded car bomb outside Bank of Greece building in heart of Athens.

 

Novinite.com

Anti-Terrorist Operation Under Way in Ukraine’s Kharkiv

April 8

Ukrainian security forces detained 70 in anti-terrorist organization in Kharkiv.

Security in the News – Week of March 31

Information Security

BetaNews

Millions of Home Routers Expose ISPs to DDoS Attacks

April 2

DNS-based DDoS amplification attacks have significantly increased in recent months, targeting vulnerable home routers worldwide.

 

Computer Weekly

Business Counts Cost of Cyber Attackers’ Secret Weapon

March 31

Global businesses are counting cost of failing to defend against advanced evasion techniques.

 

Computerworld

Untraceable Device Allows Hacker to Control Car From Miles Away

March 31

$20 untraceable device allows attacker to remotely take control of cars that are CAN-enabled vehicles.

 

Financial Firms, Social Media Remain Top Phishing Targets

April 3

Kaspersky Labs says nearly 30 percent of phishing attacks last year targeted financial institutions, second only to social networking Phishing attack campaigns.

 

CSO

Zeus Malware Found with Valid Digital Certificate

April 3

New version of notorious banking Trojan could avoid detection by browsers and anti-malware software.

 

FireEye

APT1: The State of the Hack One Year Later

April 1

FireEye COO took stage at RSA to share perspective on activities that led to release of APT1 report, aftermath.

 

Forbes

Will Pentagon’s Plan For Defeating Insider Attacks Work?

March 31

In a curious omission, there’s no mention of plans for dealing with kind of insider attacks perpetrated by Snowden.

 

Help Net Security

European Cybercrime Centre Warns About Windows XP Security Risks

March 31

European Cybercrime Centre warns security risks related to end of Windows XP support.

 

CIOs Moving More Information to Cloud

March 31

CIOs, senior-level IT leaders moving increasing percentage of organizational information into cloud, growing use of private cloud, SaaS delivery models.

 

Simple Steps to Prevent Data Theft

March 31

Tips for protecting organizations against the types of data breaches that recently occurred at major retailers.

 

Dangers of Using Outdated Software

April 2

Survey shows  many businesses are risking company assets by using outdated software.

 

Information Week

Cyber Criminals Operate On A Budget, Too

April 1

Report on how attacks have gotten more advanced, but use same old tools.

 

Krebs on Security

US States Investigating Breach at Experian

April 3

Credit bureau Experian ended up selling consumer records to identity theft service in cybercrime underground, prompted a multi-state investigations.

 

Network World

Mass Malware on Mobile Devices

March 31

Are mobile phones en masse more or less vulnerable than other systems? Or just different?

 

Whose Fault That Users are Weakest Link?

April 2

Users are weakest link when it comes to network, computer security, survey reveals users themselves aren’t entirely to blame.

 

Users Face Serious Threat as Hackers Take Aim at Routers, Embedded Devices

April 3

Attacks are likely to continue and manufacturers are largely unprepared to respond.

 

Want to Lower Risk? Lower the ROI of Hackers

April 3

Hacking is no longer a game for tech-savvy teens looking for bragging rights. It is a for-profit business, a very big business.

 

New Cybersecurity Reality: The Whole is Greater Than Sum of Parts

April 3

Integration, architecture, collective action are new reality, demand behavioral changes across industry.

 

PC Mag

Ex-Microsoft Employee Pleads Guilty to Stealing Trade Secrets

April 2

Former employee accused of leaking early copies of Windows 8 to French blogger in 2012.

 

The Tribune

Cyber-Attacks Hit Oil, Gas, Just as Much as Retail

April 1

New gen of malware is causing havoc with US businesses as hackers seek to steal private financial information.

 

TrendMicro

Looking Into The Cybercrime Underground

April 1

Key part of cybercrime research focuses on the communities that cybercriminals form.

 

Tripwire

DDoS Trends Report Reveals Spike in Botnet Activity

March 31

DDoS trend found average of 12M unique botnet-driven attacks occurring weekly in last 90 days, 240% increase over same period 2013.

 

We Live Security

NSA Revelations Impact Online Shopping, Banking, More

April 2

Online banking and shopping in America are being negatively impacted by ongoing revelations about NSAs digital surveillance activities.

 

ZD Net

Top Security Worry Keeping Businesses Awake at Night

April 3

One worry tops the rest: possibility of insider threats.

 

Security and Crisis Management

Bangkok Post

Protester Killed in Ambush, Four Wounded

April 1
Security guard shot dead, four other anti-government protesters wounded when gunmen ambushed convoy as it left Chaeng Wattana protest site.

 

BBC

Police Chief Dies in Cairo Bombings

April 2

Police brigadier-general killed, five injured when three bombs went off near Cairo University.

 

Herald Tribune

Colombian Military Operations Result in Six Rebels Killed, Four Captured

April 3

Colombian army operations in central, SW part of country, resulted in six FARC guerrillas killed, four captured, four laid down arms voluntarily.

Security in the News – Week of March 24

Information Security

BetaNews

Why Use of Personal Data for Authentication Needs to Change

March 26

We run more and more of our lives online today, with multiple accounts for different services; many sites rely on same few personal identifiers.

 

Bloomberg     

SEC Probes Threat From Cyber Attacks Against Wall Street

March 26

SEC is examining exposure of stock exchanges, brokerages and firms to cyber-attacks that have been called a threat to financial stability.

 

Computerworld

ATM Malware, Controlled by Text Message, Spews Cash

March 25

Malware can cause a cash machine to start churning out bills.

 

Gameover Malware Takes Aim at Monster.com, CareerBuilder.com

March 26

In addition, new variants of the Trojan program target Monster.com, F-Secure said.

 

DataLoss DB

Potential 7 Million Credit Card Details Leaked

March 24
Post allegedly by Anonymous Ukraine claimed to publish more than 800 million credit cards by releasing four archives.

 

Fox Business

Media Massively Over Represented in Hack Attacks

March 28

21 of world’s top news organizations have been target of likely state-sponsored hacking attacks, according to Google security engineers.

 

Help Net Security

February Spam Highlights

March 24

Kaspersky found malicious attachments in Feb. spam came in emails allegedly sent by women who wanted to make friends in run-up to V-day.

 

SCADA Risk Awareness, Threats, Breaches

March 26

268 IT professionals answered questions about overall risk awareness, trends in threats and breaches, and effective means to mitigate vulnerabilities with regard to SCADA/ICS.

 

Retailers Urge Adoption of PIN-Based Credit Cards

March 27

NRF says banks’ insistence on cards that use a signature instead of a PIN puts merchants and their customers at risk.

 

Homeland Security News Wire

Making Grid Smarter Makes it More Vulnerable to Hackers

March 25

US electric grid is constantly under attack despite attempts by utilities to boost physical security and cyber-defenses.

 

Krebs on Security

ZIP Codes Show Extent of Sally Beauty Breach

March 25

Sally Beauty acknowledged hacker break-in compromised 25K customer credit; impacted all 2600+ Sally Beauty locations.

 

Network World

IT Leaders Share Tips on Managing Security

March 24

IT security is a tricky issue. Key is to strike right balance. IT executives share advice.

 

Cybercrime Trends Point to Greater Sophistication, Stealthier Malware, More Encryption

March 25

Report on evolution of cybercrime depicts criminal complex growing more sophisticated in software tools, ability to hide from law enforcement.

 

How Do FBI, Secret Service Know Network has Been Breached Before You

March 27

They work hard to find evidence of stolen data, but companies don’t always appreciate the effort.

 

Patch Management Flubs Facilitate Cybercrime

March 27

Report calls botnet activity against organizations the biggest problem.

 

State of Security

Support of Proposed Smartphone Theft Prevention Act

March 26

Bill designed to prohibit use of stolen devices, would be rendered worthless to anyone but owner once reported stolen to carrier.

 

Security and Crisis Management

All Africa

Sudan: Gunmen Attack Darfur Civilians

March 24

UNAMID said unidentified gunmen attacked camp for internally displaced persons; number of villages in N Darfur states forcing some 3K civilians to seek protection at bases.

 

BBC

Ukraine Far-Right Leader Dies in Police Raid

March 25

Ukrainian ultra-nationalist leader shot dead in what officials describe as a special forces operation.

Security in the News – Week of March 17

Information Security

ABC News

California Targeted by Cyber-Gangs

March 20

International criminal enterprises follow the money, increasingly focusing on California because of its wealth, innovation.

 

BetaNews

Malware in Pirated Software Costs Billions

May 19

Enterprises expected to spend $500 billion in 2014 to deal with issues caused by malware in pirated software.

 

Computerworld

Opting Out, and How to Protect Personal Data Offline

March 19

How to say no to direct mail, other offers.

 

Digital Bond

Mining Malware – Seeking, and Finding False Positives

March 17

What would automation software look like, would it be successful?

 

Forbes

Hidden Cost Of Cyber Crime

March 20

Estimated that cyber-attacks in 2013 cost the world $113 billion.

 

Help Net Security

Aversion to New Facebook News Feed Could Lead to Scams

March 19

When users express a need, cyber scammers will pretend to fill it.

 

20% of Malware Created Appeared in 2013

March 19

Cyber-criminals created and distributed 20 percent of all malware that ever existed, average of 82K day.

 

Krebs on Security

Sally Beauty Confirms Card Data Breach

March 17

Hackers broke into network and stole credit card data from stores.

 

Network World

Strategies for Successful DLP Strategy
March 17

CISOs offers tips on starting slow for an effective plan.

 

Lessons CIOs Can Learn From Target Breach

March 17

Key lessons from Target’s very public example of a data breach.

 

Ways to Improve Wired Network Security

March 17

In a world of insider threats, the security of the wired portion of network should also be top of mind.

 

20 Infamous Hacker Security Vendor Break-Ins

March 18

20 notorious known break-ins over past decade.

 

Seattle PI

Ex-Microsoft Employee Charged with Passing Blogger Trade Secrets

March 19

Angry worker sent blogger Windows 8 code, internal documents.

 

State of Security

Adobe ColdFusion Hackers Hit Automaker Citroen

March 18

Detects unauthorized access on site servers; presence of backdoor agent compromised customer data.

 

We Live Security

You Have Cancer Phishing Attack Shows How Low Cybercriminals Will Go

March 17

Phish purporting results of blood count report showing recipient may have cancer, circulating in UK.

 

Over 500K PCs Attacked Every Day after 25K UNIX Servers Hijacked

March 18

If you run site on Linux server or responsible for security of UNIX servers, you should do this now.

 

Security and Crisis Management

All Africa

Kenya: Mombasa Police Foil Terror Attack

March 17

Police in Mombasa thwarted what could have been a major terrorist attack, after detaining a vehicle found with explosives.

 

BBC

Crimea Crisis: Pro-Russians seize Ukrainian Naval Basis

March 19

Pro-Russian forces took control of two naval bases in Crimea, including HQ of Ukraine’s navy.

 

Reuters

Car Bombs Kill Eight at Libya Army Academy in Benghazi

March 17

Several car bombs exploded at a Libyan army academy in the eastern city of Benghazi.

Security in the News – Week of March 10

Information Security

Computerworld

Snowden Advocates at SXSW for Improved Data Security

March 10

Best encryption may conflict with business model of Google and Facebook.

 

Dawn

US Network to Scan Workers with Secret Clearances

March 10

US intelligence to electronic monitor behavior of five million federal employees with secret clearances, current and former officials.

 

HelpNet Security

Techniques Used in High Profile Data Breaches

March 10

Report highlights role of dark web malware as key enabler of POS attacks, data breaches in 2013.

 

MasterCard and Visa Accelerate Payment Security

March 10

New cross-industry group to enhance payment system security for expectations of consumers, retailers, financial institutions.

 

Malware Peddlers Trying out Different Exploit Kits

March 10

Researchers believe recent spam campaigns initiated by infamous ru:8080 gang.

 

Fraudulent Tax Returns Net $4 billion for Cybercriminals

March 11

Risks consumers face during tax season and strategies to protect taxpayer identities, especially when filing online returns.

 

Krebs on Security

NoMoreRack.com Probes Possible Card Breach

March 11

Retailer hired computer forensics team after potential breach of customer card data.

 

Blogs of War: Don’t Be Cannon Fodder

March 13

KrebsOnSecurity was hit with attack which leveraged a feature in 42 blogs running WordPress content management system.

 

Last Watchdog

How Massive DDoS Attacks Leverage Internet’s DNA

March 10

Massive DDoS attacks are disrupting Internet commerce, slowing down speed of the web.

 

Network World

How Does Certificate-Based Authentication Work

March 10

Review how certificate-based authentications actually work.

 

Researchers Attack Secured Internet Activity to Mine Personal Data

March 11

Technique governments, Internet service providers could use to bypass secured connections, gather personal information.

 

Cyber Attacks Could Paralyze US

March 11

Former US Secretary of Defense renews warning of a cyber-Pearl Harbor attack.

 

Has Mobile Computing Had Positive Impact on Cyber Security?

March 11

Counterintuitive perspective, mobile computing chaos may help improve enterprise cyber security strategy.

 

Sophisticated Scam Targeting Verizon Wireless Customers

March 13

Scam uses Caller ID spoofing technology, fake website to garner personal information.

 

Security Affairs

Marketing Approach of Cybercrime to Phishing Emails

March 10

Cybercrime manages phishing emails using techniques similar to those used by the marketing industry.

 

State of Security

Target Hackers Had Detailed System Information

March 11

Analysis indicates attackers had intimate knowledge of network, customize malicious code for optimal performance.

 

Unbalanced Security is Increasing Attack Surface

March 11

Problems caused by unbalanced security, security solutions that fight for same resources.

 

Attacks on Healthcare Organizations Spike

March 13

Annual study by Ponemon Institute reveals new security, privacy threats to hospitals, patient records they manage.

 

Threat Post

200 Million Consumer Records Compromised in Experian ID Theft Case

March 10

Ongoing investigation reveals man posing as PI compromised millions of Americans’ personal, financial records from 2007-2013.

 

Security and Crisis Management

BBC

Turkey Mass Protests: Two Dead after Teenager’s Funeral

March 12

Two died during protests across Turkey following funeral of teen wounded in anti-government clashes last year.

 

Venezuela Protests: Three Killed in Fresh Unrest

March 12

Three died in fresh protests in Venezuela in the central city of Valencia

Security in the News – Week of March 3

Information Security

Chicago Tribune

Cyber Attacks Up 32% in 2013

March 5

Crashing websites, overwhelming data centers, new-gen of cyber-attacks costing millions, staining structure of internet.

 

Computerworld

How to Protect Personal Data

March 3

Privacy under attack, but there are things you can do to protect your personal data.

 

CIO Not Only One to Blame for Target Breach

March 5

Jacob’s resignation not surprising, but disappointing, analysts say.

 

CSO

Organized Fraudsters Pose Biggest Cyber Security Threat

March 3

Growing attacks reflect evolving criminality, impact grows with mobile compromises, financial fraud.

 

Help Net Security

Cyber Crooks Will Go After Medical Records Next

March 3

Cyber crooks to look for new, more lucrative targets, and ones poorly secured.

 

Managing Vulnerabilities in Business Context

Monday 3

Cyber-attacks have direct impact on bottom line, yet many orgs lack visibility to manage risk from perspective of business.

 

Trends Shaping Mobile Forensics

March 3

Interviews with leading mobile forensic experts asked opinion on top trends shaping mobile forensics.

 

Cyber Security Concerns Becoming Boardroom Issue

March 6

Cyber security planning, protection is key theme on strategic agenda of boards, CEOs.

 

Peek into China’s Burgeoning Mobile Cybercriminal Underground

March 6

Chinese underground market awash with cyber crooks buying, selling services and devices, aimed at taking advantage of them.

 

Krebs on Security

Thieves Jam Up Smucker’s Card Processor

March 4

Shuttered online store, notifying visitors site retooled because of security breach jeopardized customers’ credit card data.

 

Network World

Nearly All Apps are Vulnerable

March 3

96% of apps tested show at least one security vulnerability, an improvement.

 

Even Apple and Google Can’t Protect Users from Inherent Mobile App Risks

March 4

There is no such thing as a free app.

 

RSA Conference Recap: Positive Direction for Security Industry

March 3

Discussions focused on enterprise customer requirements rather than silver bullet solutions.

 

CyberLocker’s Success Will Fuel Copycats

March 5

Ransomware with unbreakable encryption will attract cyber bandits like flies to offal.

 

Apple Reveals Unprecedented Details in iOS Security

March 6

Updated Apple whitepaper reveals interlocking, defense-in-depth architecture for iPhone, iPad OS.

 

Half of Exploits Target Java

March 6

Java’s prevalence on devices and lax defenses make it a favorite target of malware developers.

 

PC Magazine

How to Report Internet Fraud

March 5

The rate of Internet fraud is increasing. Here’s what to do if you’re one of its victims.

 

Security Affairs

FireEye 2013 Advanced Threat Report on APTs Campaigns

March 6

FireEye 2013 Advanced Threat Report provides high-level overview of computer network attacks by APTs discovered.

 

We Live Security

Netflix Phish, Tech Support scam, Same Phrying Pan

March 3

Tech support scam, taking money for a computer problem you don’t have; this one is too interesting not to look at.

 

Twitter Mass Password Reset Was Mistake

March 4

Password reset sent to users due to supposed compromise of accounts; company admitted reset was initiated by mistake.

 

More than 300K Wireless Routers Hijacked

March 4

Unknown cybercriminals made malicious changes to devices’ settings, misdirect computers to websites of choice.

 

Courier Scams – Don’t Give Away Bank Card

March 5

Elaborate scam reported a few times in the UK in the past few months.

 

Security and Crisis Management

Reuters

Two Dead in Venezuela Violence as Protests Drag On

March 7

Venezuelan soldier, motorcyclist died in confused melee sparked by opposition’s barricading of street, boosting death toll from nearly a month of violence to 20.

 

Thais Defer Decision on Emergency after Two Hurt in Shooting

March 7

Thai officials assessing whether to maintain state of emergency hours after two wounded in shooting at site of anti-government protests.