In late 2020 a growing number of Iranians in the capital (Tehran) were openly complaining of an odd problem with the GPS on their cellphones. At seemingly random times the GPS indicated another location than the one the user knew they were at. After months of complaints to the city government were ignored, one frustrated… Read More From China To Iran: A In-Depth Look At GPS Spoofing Technology
In late 2020 someone carried a major hacking attack on Israeli supply and logistics firms. Worse, it wasn’t a ransomware attack demanding money but simply to obtain information, and this series of attacks was very successful. The attackers first penetrated Amital Data, an Israeli software developer that supplies specialized software to firms that distribute goods.… Read More Analysis: On the Fallout from the Amital Cyber Attack. Tracking Bitcoin Payments Back to Iran
News Monitors/Strategy Page – Yet another North Korean Cyber War attack on South Korea was recently discovered. This one involved a successful effort to hack an Android bus navigation app used in four South Korean cities. The malware, once on the phone, sent back all information found on the phone that included matching one of… Read More Information Warfare: North Korean Sith Incentives
In terms of understanding and engaging customers, the video game industry has gone through a massive transformation in recent years. Before this transformation, video games were physical products that could be purchased over the counter, with little to no understanding of player retention or behavioral analysis for the people who sold them. That all… Read More Data Mining and Video Games: Drawing in a New Generation of Players to Soldiers and Fight
Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing “dozens of terabytes” of social media posts and similar pages – all scraped from around the world by the US military to identify and profile persons of interest. The archives were found by UpGuard’s veteran security-breach hunterChris Vickery during a routine scan of… Read More News Monitors Inc. explains 2017’s Massive US military social media spying archive left wide open in AWS S3 buckets
News Monitors – Abstract The Darknet has become a hub for hacking communities, offering cyber criminals the ability to freely discuss and sell unknown and emerging exploits. This paper focuses its attention on studying the effectiveness of machine learning for providing cyber threat intelligence from Darknet hacking forums. Developing a functioning system for extracting information from… Read More Cyber Threat Intelligence: Applying Machine Learning, Data Mining and Text Feature Extraction to the Darknet
Scientists from RMIT University and Wuhan Institute of Technology demonstrated a next-generation optical disk with up to 10TB capacity and a six-century lifespan using gold nanoparticles. The technology could radically improve the energy efficiency of data centers according to the researchers, using 1000 times less power than a hard disk center by requiring far less cooling and… Read More News Monitors Blog: Bits: Data storage; polymer supercapacitors; zero field switching.
Regarding STRENGTH, SENTIMENT, INFLUENCERS, PASSION, AND REACH Here’s what they mean: The influence score is News Monitors scoring system to identify which mentions are of higher importance.The score is currently available for 3 sources: Twitter, Web, and Instagram. It is always a number between 0 and 100 for all sources in order to be able… Read More News Monitors Analytics: How is STRENGTH, SENTIMENT, INFLUENCERS, PASSION, AND REACH score calculated?
Never miss another mention Use social media listening to analyze brand mentions across 10 social networks including full firehose access to Twitter. Go beyond social to track discussions on online news sites, blogs, forums, offline databases and understand what your customers and prospects think of your brand. Never miss another opportunity to connect with your… Read More News Monitors Engine: VIEW OF YOUR BRAND WITH SOCIAL LISTENING