This document appears to be a presentation discussing online privacy and tracking. It provides an overview of how companies track users across different websites and devices, the scale of tracking by major companies, and challenges regarding user awareness and regulation. The presentation concludes that while protecting devices is important, the priority now is protecting user privacy and ensuring meaningful consent and control over personal data and online tracking.
Beyond Hacktivism - why #policymatters - Zan Markan - Codemotion Milan 2016Codemotion
We live in a brave new world. Public policy is not just about Assange, Snowden and Dotcom anymore. Legal battles are being fought in courtrooms in EU and US for the future of software development. In the last 12 months, we’ve had several issues directly impacting developers pop up on our governments’ radars, and we’ve had limited reach. Legality of Encryption. Digital Single Market. Android Antitrust. Freedom to use APIs, and more. We’ll look at the most pressing issues that could affect the lives of millions of developers, and hundreds of millions of citizens.
Facebook recently came under fire for the discreet international roll-out of its photo facial recognition feature. This feature automatically identifies and suggests tags for individuals appearing in photos posted on Facebook. At first glance, this seemingly innocuous feature appears to quietly augment online social lives. At second glance, the rollout of this feature as a defaulted-to-on setting with no explicit user consent raises many privacy concerns. As a site with extensive power driven by the quantity, quality, and kind of data it collects, Facebook’s decision to step into the world of visual recognition of its users without formal user consent is a big no-no—or is it?
Join us for this month’s eBoost Consulting Brown Bag Lunch Webinar to explore this and other cases that raise internet privacy concerns. Learn the ins, outs, and nuances of internet privacy to determine where to draw the line on data collection and usage.
Social media research is an executable form of market research. The presentation covers how companies can implement a social media research process in their organization.
Beyond Hacktivism - why #policymatters - Zan Markan - Codemotion Milan 2016Codemotion
We live in a brave new world. Public policy is not just about Assange, Snowden and Dotcom anymore. Legal battles are being fought in courtrooms in EU and US for the future of software development. In the last 12 months, we’ve had several issues directly impacting developers pop up on our governments’ radars, and we’ve had limited reach. Legality of Encryption. Digital Single Market. Android Antitrust. Freedom to use APIs, and more. We’ll look at the most pressing issues that could affect the lives of millions of developers, and hundreds of millions of citizens.
Facebook recently came under fire for the discreet international roll-out of its photo facial recognition feature. This feature automatically identifies and suggests tags for individuals appearing in photos posted on Facebook. At first glance, this seemingly innocuous feature appears to quietly augment online social lives. At second glance, the rollout of this feature as a defaulted-to-on setting with no explicit user consent raises many privacy concerns. As a site with extensive power driven by the quantity, quality, and kind of data it collects, Facebook’s decision to step into the world of visual recognition of its users without formal user consent is a big no-no—or is it?
Join us for this month’s eBoost Consulting Brown Bag Lunch Webinar to explore this and other cases that raise internet privacy concerns. Learn the ins, outs, and nuances of internet privacy to determine where to draw the line on data collection and usage.
Social media research is an executable form of market research. The presentation covers how companies can implement a social media research process in their organization.
Enterprise Open Source Intelligence GatheringTom Eston
Presented at the Ohio Information Security Summit, October 30, 2009.
What does the Internet say about your company? Do you know what is being posted by your employees, customers, or your competition? We all know information or intelligence gathering is one of the most important phases of a penetration test. However, gathering information and intelligence about your own company is even more valuable and can help an organization proactively determine the information that may damage your brand, reputation and help mitigate leakage of confidential information.
This presentation will cover what the risks are to an organization regarding publicly available open source intelligence. How can your enterprise put an open source intelligence gathering program in place without additional resources or money. What free tools are available for gathering intelligence including how to find your company information on social networks and how metadata can expose potential vulnerabilities about your company and applications. Next, we will explore how to get information you may not want posted about your company removed and how sensitive metadata information you may not be aware of can be removed or limited. Finally, we will discuss how to build a Internet posting policy for your company and why this is more important then ever.
7 Things Your Nonprofit Can Do to Get the Most out of Your Website in 2020TechSoup
In this webinar, our partners at Tapp Network, a purpose-driven digital agency, will walk you through client case studies and key insights on how to improve your web presence so your marketing efforts don't go to waste. Following this webinar, you'll know how to evaluate your website and take seven actionable steps to ensure that your organization is putting its best foot forward in all things digital for 2020.
Curating Social Media Data And Compiling Them TogetherPitra Satvika
How do you search for Indonesia's social media data? How do you compile them together? How do you put them all into context?
A sort of behind the scene on how my team compile the white book "Social Media Landscape in Indonesia."
Check the book at www.strategocorp.com/socialmedia2012
Measuring adblockers impact on site performanceKaran Kumar
Velocity Santa Clara 2016 talk!
Users’ ad blockers are impacting your site’s perceived performance, but measuring the impact of ad blockers on actual and perceived performance can be difficult. While ad blockers are reported to improve performance, the lack of proper tooling can make metrics difficult to collect and their true impact difficult to measure. Karan Kumar offers an overview of new testing he has created that measures the overall impact ad blockers have on the quality of user experience and performance across a number of sites.
Topics include:
How ad blockers work
The components of these extensions that cause the biggest impact on performance
Issues that arise in terms of user experience
The impact of ad blockers on top Alexa and Internet retailer sites
How to create a private instance to measure the impact of ad blockers on your own website with open source technology
Link to description
http://conferences.oreilly.com/velocity/devops-web-performance-ca/public/schedule/detail/51264
Cool Tools for the Cloud Generation takes business on a beginner's journey through free tools that could change your perception on the value the Internet holds to your business. From playing around with FaceBook demographics to finding out just how many people are searching for your keywords on Google... If
(Another) Wild Year in Data Privacy: What Went Down in 2022 & What to Expect ...Tinuiti
Here we are at the end of another crazy year navigating an ever-changing privacy landscape. And, we hate to break it to you…but 2023 is shaping up to bring even more changes. The question is – are you prepared?
In this webinar, our privacy experts recap everything that happened in 2022, and provide you with your survival guide for 2023 – you won’t want to miss this.
Digital Marketing Trends and Must-Have Solutions for 2023 Milestone Inc
Here's a perfect recipe for search marketing strategies, digital marketing and consumer trends, along with the must-haves for search marketers in 2023.
Digital Marketing Trends and Must Have for 2023 Benu Aggarwal
Sharing latest Digital Marketing trends and must have for 2023.
As we say goodbye to 2022 and welcome in 2023, it is a great time to review noticeable changes in search and consumer behaviors and next year plan for key digital marketing initiatives. In this webinar, we have discussed most significant search, digital marketing & consumer trends, and the must-haves for digital marketers in 2023.
https://vimeo.com/778999690 (Video)
The tools used by the CRO masters round the world to optimise analytics, UX, VOC,insight and testing - all to optimise your insight or conversion figures.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Enterprise Open Source Intelligence GatheringTom Eston
Presented at the Ohio Information Security Summit, October 30, 2009.
What does the Internet say about your company? Do you know what is being posted by your employees, customers, or your competition? We all know information or intelligence gathering is one of the most important phases of a penetration test. However, gathering information and intelligence about your own company is even more valuable and can help an organization proactively determine the information that may damage your brand, reputation and help mitigate leakage of confidential information.
This presentation will cover what the risks are to an organization regarding publicly available open source intelligence. How can your enterprise put an open source intelligence gathering program in place without additional resources or money. What free tools are available for gathering intelligence including how to find your company information on social networks and how metadata can expose potential vulnerabilities about your company and applications. Next, we will explore how to get information you may not want posted about your company removed and how sensitive metadata information you may not be aware of can be removed or limited. Finally, we will discuss how to build a Internet posting policy for your company and why this is more important then ever.
7 Things Your Nonprofit Can Do to Get the Most out of Your Website in 2020TechSoup
In this webinar, our partners at Tapp Network, a purpose-driven digital agency, will walk you through client case studies and key insights on how to improve your web presence so your marketing efforts don't go to waste. Following this webinar, you'll know how to evaluate your website and take seven actionable steps to ensure that your organization is putting its best foot forward in all things digital for 2020.
Curating Social Media Data And Compiling Them TogetherPitra Satvika
How do you search for Indonesia's social media data? How do you compile them together? How do you put them all into context?
A sort of behind the scene on how my team compile the white book "Social Media Landscape in Indonesia."
Check the book at www.strategocorp.com/socialmedia2012
Measuring adblockers impact on site performanceKaran Kumar
Velocity Santa Clara 2016 talk!
Users’ ad blockers are impacting your site’s perceived performance, but measuring the impact of ad blockers on actual and perceived performance can be difficult. While ad blockers are reported to improve performance, the lack of proper tooling can make metrics difficult to collect and their true impact difficult to measure. Karan Kumar offers an overview of new testing he has created that measures the overall impact ad blockers have on the quality of user experience and performance across a number of sites.
Topics include:
How ad blockers work
The components of these extensions that cause the biggest impact on performance
Issues that arise in terms of user experience
The impact of ad blockers on top Alexa and Internet retailer sites
How to create a private instance to measure the impact of ad blockers on your own website with open source technology
Link to description
http://conferences.oreilly.com/velocity/devops-web-performance-ca/public/schedule/detail/51264
Cool Tools for the Cloud Generation takes business on a beginner's journey through free tools that could change your perception on the value the Internet holds to your business. From playing around with FaceBook demographics to finding out just how many people are searching for your keywords on Google... If
(Another) Wild Year in Data Privacy: What Went Down in 2022 & What to Expect ...Tinuiti
Here we are at the end of another crazy year navigating an ever-changing privacy landscape. And, we hate to break it to you…but 2023 is shaping up to bring even more changes. The question is – are you prepared?
In this webinar, our privacy experts recap everything that happened in 2022, and provide you with your survival guide for 2023 – you won’t want to miss this.
Digital Marketing Trends and Must-Have Solutions for 2023 Milestone Inc
Here's a perfect recipe for search marketing strategies, digital marketing and consumer trends, along with the must-haves for search marketers in 2023.
Digital Marketing Trends and Must Have for 2023 Benu Aggarwal
Sharing latest Digital Marketing trends and must have for 2023.
As we say goodbye to 2022 and welcome in 2023, it is a great time to review noticeable changes in search and consumer behaviors and next year plan for key digital marketing initiatives. In this webinar, we have discussed most significant search, digital marketing & consumer trends, and the must-haves for digital marketers in 2023.
https://vimeo.com/778999690 (Video)
The tools used by the CRO masters round the world to optimise analytics, UX, VOC,insight and testing - all to optimise your insight or conversion figures.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
8. Remember Gator Corporation? [1998-2008]
! “The leader in online behavioral marketing”
! 2003: installed on 35 million PCs
! Spyware? I will send you my lawyers
! Report behavior, replace Ads
! Top management: most in
the online Ads industry now
PAGE 8 |
9. Regulation?
Better protections. Consumers Union, the advocacy arm of
Consumer Reports, wants a national privacy law that holds all
companies to the same privacy standards and lets consumers
tell companies not to track them online
PAGE 9 | 1 2 3 4 5 6
11. Business is business
In November, regulators in Germany found that such
information was being collected on Facebook users for up
to two years even after they deactivated their accounts.
Facebook said that was needed to enhance security, a
claim German regulators rejected. Both sides say they are
willing to talk, but Facebook’s website says it doesn’t share
such data without your permission and deletes it or makes
the information anonymous within 90 days.
PAGE 11 | 1 2 3 4 5 6
12. ! Google Privacy Policy
• Information you give to us
• Information we get form your use of our services
• Device information (HW model, OS, UDI, Phone number)
• Log information
– search queries
– phone number, forwarding numbers, time and date of calls, duration
of calls
– IP
– Device info (system activity, browser language, date and time of your
request and referral URL)
– Cookies
• Location (GPS, WIFI Aps, cell towers)
• Applications
Source: www.google.com/policies/privacy
PAGE 12 | 1 2 3 4 5 6
22. Analyzing World´s top traffic (I)
! The experiment
• Browsed top 100 sites country by country according to Alexa
• Sniffed all the traffic
• Set up a database of tracking sites (around 1500 domains)
PAGE 22 | 1 2 3 4 5 6
23. Analyzing World´s top traffic (II)
! Countries with most requests to tracking domains
36
World avg. 24,58%
35
34
33
32
31
30
29
28
GB QA YE NP US AU PK SD AL CA
PAGE 23 | 1 2 3 4 5 6
26. Analyzing World´s top traffic (III)
! Top 100 domains WITHOUT references to tracking sites (country
by country avg):
49,96%
! Why so low?
! Let´s take top 10 sites instead of top 100
! References to tracking sites:
92,32%
! Top 100 world sites: 89% tracking (source: digitaltrends.com)
PAGE 26 | 1 2 3 4 5 6
27. Analyzing World´s top traffic (III)
! Top 100 domains WITHOUT references to tracking sites (country
by country avg):
49,96%
! Why so low?
! Let´s take top 10 sites instead of top 100
! References to tracking sites:
92,32%
! Top 100 world sites: 89% tracking (source: digitaltrends.com)
PAGE 27 | 1 2 3 4 5 6
35. Conclusions
• Recipe for the disaster: tons of money, low regulation,
relaxed self regulation
• Privacy vs business objectives
• User´s awareness raising: who is offering them solutions?
We did help with Gator in the past.
The difference? They installed unwanted software.
However it was the same goal using different means.
In 2012 is not about protecting the device, but protecting the user.
PAGE 35 | 1 2 3 4 5 6
36. Thank you!
I´m not a number, I´m a free man
Vicente Diaz, Senior Security Analyst
@trompi
Virus Bulletin 2012
PAGE 36 |