Google Suggest is Now Smarter… Sometimes by @5le

Sometime last year, Google launched a feature that incorporates knowledge graph data into Google suggest. It would be fantastic…. if only it worked.

The post Google Suggest is Now Smarter… Sometimes by @5le appeared first on Search Engine Journal.

View full post on Search Engine Journal

Google May Discontinue Its AJAX Crawlable Guidelines

Does your site use AJAX? Well, Google may stop crawling those pages. More details to come from Google as early as next week.

The post Google May Discontinue Its AJAX Crawlable Guidelines appeared first on Search Engine Land.

Please visit Search Engine Land for the full article.

View full post on Search Engine Land: News & Info About SEO, PPC, SEM, Search Engines & Search Marketing

How Blackphone Turned A Security Fail Into A Win

Last year, privacy-focused Blackphone got a dubious distinction: It became known as the locked-down phone that supposedly got hacked in just 5 minutes.

Things have changed. Now, it’s a whole mobile product line geared for companies (and perhaps paranoid individuals), a brand-new acquisition for encryption services firm Silent Call, and a multi-million dollar enterprise with nearly $750 million in device sales.

The group introduced its latest devices this week at Mobile World Congress—the Blackphone 2 smartphone and its first tablet, currently dubbed Blackphone+. But what was really on display was the company’s uncanny knack for turning a well-publicized security flub into a win.

Meet Blackphone 2 And Blackphone+

As far as upgrades go, the 5.5-inch Blackphone 2 looks like a decent successor to last year’s original 4.7-inch Blackphone.

Like most second-generation phones, version 2 offers several hardware improvements, including a faster 64-bit 8-core processor, more memory (3GB), a bigger battery and a larger display. The phone also ties into Citrix’s Mobile Device Management, so IT departments can manage employees’ company-supplied or BYO (“bring your own”) phones. Blackphone 2 is priced at $630 (unlocked) and slated for a July release. Soon after, it will be joined by the company’s first tablet, the 7-inch Blackphone+, sometime this fall. 

The original Blackphone (left) and Blackphone 2 exhibition unit (right)

Both run Blackphone’s PrivatOS software, a variation on Android designed as an extra layer of protection between users and the big, bad outside world. When apps unnecessarily ask for personal data, like contacts or location, Blackphone can intercept the request, blocking or obscuring it. The software can even fool the app into thinking the user granted access, even if he or she didn’t.

“You can take an Android device, you can root it, introduce [similar] features, and after months, you can have something like Blackphone,” said Javier Agüera, Blackphone’s founder and now a chief scientist at Silent Call. “Or you can have an out-of-the-box device, with everything set up by security specialists, that’s enterprise ready and configured the way you need it.”

PrivatOS boasts new virtualization feature called “Spaces,” which offers separate “work” and “personal” modes, the ability to add profiles and an app store vetted by Blackphone. The technology’s encryption protocols also save keys on the device itself, not some unknown remote server. The phone’s price includes two years of security services that guards against unsafe WiFi networks, private browsing, and secure cloud file storage.

Sounds like a lot of protection, at least, it’s more than most users are accustomed to getting. It all goes back to Blackphone’s mission: The company wants to safeguard people. It seems sincere—even though a hacker actually did manage to breach those walls last year.

Turning Hackers Into BFs

PrivatOS running on last year’s model

At hacking convention DefCon last year, CTO Jon “Justin” Sawyer of Applied Cybersecurity LLC told Blackphone that he managed to get past its security to root its device. What’s more, he tweeted the exploit, which landed on BlackBerry sites and other tech blogs.

Sawyer found a couple of weak spots in the software, including a hole in the remote wipe feature that let the security expert access the device and grant himself system privileges. He was able to give himself access to core parts of the phone. But what gets less attention, the execs said, is that the company had already patched the hole.

Sawyer essentially attacked an old, outdated version of the software. Even so, the incident and publicity could have humiliated Blackphone right out of the market. It didn’t. Instead, the company is milking it. 

The team thanked Sawyer for the discovery and sent him a bottle of wine. Then it enlisted others to scope out any other vulnerabilities. 

According to Vic Hyder, Silent Call’s chief strategy officer, Blackphone recently launched a bug bounty program to reward people for finding security glitches—from $128 to more, depending on the severity. (Bounties are fairly common in the tech industry; even big companies like Facebook, Google and Microsoft offer rewards to bug hunters.)

“[It] makes them part of the solution, instead of part of the problem,” Hyder said. “It brings everybody in as a participant.” Even Sawyer, now a friend of Blackphone, helps out by looking for other vulnerabilities. The company publishes all of its source code, to help make it easier for people to find holes.

So far, Hyder estimates that the company has paid out about $15,000 to $20,000 in bounties.

Throwing Shade

“Nothing is hack-proof,” admits Daniel Ford, chief security officer.

However, he says his company can help guard against certain types of attacks. “Targeted attacks are completely different than mass surveillance,” he said.” There’s little Blackphone or anyone can do against the former, such as last year’s breach at Sony Pictures—which may have been a specific retaliation for The Interview, a comedy that poked fun at North Korea. 

Sony’s “The Interview” made fun of North Korea’s regime, which may have been responsible for hacking the movie studio. 

Ultimately, if a hacker wants your data badly enough—whether it’s a criminal or a NSA agent—he or she has innumerable tools that can help get it. No platform can hold up against that, he explained.

But when it comes to broader mass surveillance, Ford said Blackphone can step in and offer more protection. “This is where our commitment is: If there is a vulnerability that was disclosed publicly, we will fix it in less than 72 hours,” he said. “We have done so every time. That is our goal … the last time, it took only 6 hours.”

“Samsung had two critical vulnerabilities that was released two weeks ago,” he added, calling out one of his archrivals in the enterprise market, albeit for a vulnerability in its TV business. Still, he couldn’t resist poking at Samsung’s overall attitude toward security: “They have not even started to address it,” he said. 

Photos by Adriana Lee for ReadWrite

View full post on ReadWrite

Customizing Your PPC Campaigns to Browsers, Shoppers, & Buyers

Understanding your customers’ mindset as they move through the customer lifecycle is imperative to running successful campaigns. This is especially true in search marketing, where it’s vital to understand the basic mechanisms behind how people search.

View full post on Home – SearchEngineWatch

Google May Discontinue Their AJAX Crawlable Guidelines

Does your site use AJAX? Well, Google may stop crawling those pages. More details to come from Google as early as next week.

The post Google May Discontinue Their AJAX Crawlable Guidelines appeared first on Search Engine Land.

Please visit Search Engine Land for the full article.

View full post on Search Engine Land: News & Info About SEO, PPC, SEM, Search Engines & Search Marketing

Netmark Named Best SEO Service by for March 2015 – Marketwired (press release)

Netmark Named Best SEO Service by for March 2015
Marketwired (press release)
NAPLES, FL–(Marketwired – March 05, 2015) – The independent authority on internet marketing solutions,, has named Netmark the best search engine marketing company for March 2015. Netmark was selected due to their strong performance in …

and more »

View full post on SEO – Google News

Fitbit Bulks Up With Purchase Of Fitness Trainer App FitStar

ReadWriteBody is an ongoing series where ReadWrite covers networked fitness and the quantified self.

Even having a hit app isn’t enough to stay independent in the digital-fitness business. The latest company to sell out: FitStar, a maker of workout apps. Fitbit, the maker of the most popular line of fitness trackers, announced Thursday it would buy the startup for an undisclosed amount.

As with Under Armour’s still-fresh purchase of MyFitnessPal, I find the deal inevitable yet disappointing. There are fewer and fewer independent players in the fitness-app business, and those who remain seem likely to come under pressure from the generic but well-distributed health apps included with upcoming smartwatches and fitness devices.

Fitness Buddies Working Out A Deal

FitStar’s personal-training and yoga apps feature video workouts customized to users’ fitness levels and past performance. Fitbit plans to integrate FitStar with its hardware and apps in various ways, from feeding FitStar workout data into the Fitbit app’s activity feed, letting Fitbit users log into FitStar with their Fitbit account credentials, and eventually feeding heart-rate data from its Charge HR and Surge wristbands into FitStar to further tune workouts.

FitStar CTO Dave Grijalva and I have had long, ongoing conversations about the potential for integrating heart-rate data and other biological signals into the company’s apps. Right now, FitStar customizes workouts based on users’ perceived effort. As you work out, you report on whether a workout segment was too easy, too hard, or just right. 

Heart-rate data can give a more objective evaluation of your performance. It can also alert an app that you’re tired or overtrained, and hence need to dial it back. FitStar could customize rest-period duration, workout intensity, and even the sequence of moves based on such data.

FitStar CTO Dave Grijalva

From that perspective, Fitbit’s acquisition of FitStar starts to make more and more sense. Most consumers aren’t capable of parsing their own heart-rate signals to take action and change their workouts, rest, or nutrition. FitStar can act as a virtual trainer for Fitbit tracker owners, allowing them to derive more value from the devices they bought. 

Since FitStar charges users monthly or annual subscriptions for more fully-featured, customized workouts, it could provide another way to make money off those hardware owners. Fitbit has its own $49.99/year subscription plan, which provides more general training advice. Fitbit and FitStar may well fold their subscription offerings together, perhaps at a higher price point for a combined plan.

Will FitStar Stay Open?

One key question: Will Fitbit close FitStar off to rival services? Right now, FitStar is a relatively open app, with connections to Fitbit rivals including Jawbone, Runtastic, and Apple. Fitbit, meanwhile, has pursued a more closed-off path. It has deliberately abstained from supporting Apple’s HealthKit framework for allowing apps store and share fitness data on iPhones. 

See also: Here Come Apple And Google In The Battle For Your Health

Fitbit could well decide to yank FitStar’s HealthKit support—though that could have negative repercussions for FitStar’s business, which has enjoyed prominent placement in Apple’s App Store.

A New Fitness-App Market Shapes Up

What’s clear is that Fitbit wants to stay on top of the fitness-tracker market as the Apple Watch comes to market. Fitbit’s main rival, Jawbone, is reportedly in bad financial shape after failing to raise the full amount of a promised $250 million investment round. It could well sell out to a larger player soon, or raise money from a strategic partner in a deal that limits its independence.

Even after the MyFitnessPal and FitStar deals, both the fitness hardware and app markets remain highly fragmented. Runtastic, an Austrian company, has a majority owner, Axel Springer—though it could likely be purchased for the right price. RunKeeper is another target. There’s a host of lesser-known app makers, and a huge number of mostly lookalike fitness wearables.

The market needs consolidation. It will continue to happen horizontally, with companies buying up multiple apps, as Under Armour did with MapMyFitness, MyFitnessPal, and Endomondo, and vertically, as Fitbit did with FitStar. The best companies will offer consumers hardware in the form of fitness trackers, software in the form of mobile apps, and subscription services—either premium features unlocked in the hardware and app, or new, customized experiences like FitStar’s workout videos, or both.

FitStar was an interesting company to watch. But Fitbit is clearly in a better position to take some of its ideas to market, like mixing heart-rate signals with other data to create the perfect workout. The good news: Building hardware and apps keeps getting cheaper. There will be more new companies to write about. Let’s just hope that they get to do what FitStar did—make a mark on the industry with their innovations before they get bought out.

Photos courtesy of FitStar

View full post on ReadWrite

Converged Media Requires Converged Metrics

A local digital marketing program that combines paid, earned, and owned will not only attract customers but also deliver a breakthrough benefit in the form of a blended cost per lead.

View full post on Home – SearchEngineWatch

Negative SEO Site Defies Expectations – PR Newswire (press release)

Negative SEO Site Defies Expectations
PR Newswire (press release)
Negative SEO is a topic shrouded in controversy and speculation. Since search engines introduced algorithms to reduce low-quality sites in their search results, sites have been penalized for spammy backlinks and duplicate content — and black hatters

View full post on SEO – Google News

Go to Top
Copyright © 1992-2015, DC2NET All rights reserved