Wednesday 26 April 2017

Hackers Exploited Word Flaw for Months While Microsoft Investigated

To understand why it is so difficult to defend computers from even moderately capable hackers, consider the case of the security flaw officially known as CVE-2017-0199.


The bug was unusually dangerous but of a common genre: it was in Microsoft software, could allow a hacker to seize control of a personal computer with little trace, and was fixed April 11 in Microsoft's regular monthly security update.

But it had travelled a rocky, nine-month journey from discovery to resolution, which cyber-security experts say is an unusually long time.

Google's security researchers, for example, give vendors just 90 days' warning before publishing flaws they find. Microsoft declined to say how long it usually takes to patch a flaw.

While Microsoft investigated, hackers found the flaw and manipulated the software to spy on unknown Russian speakers, possibly in Ukraine.

And a group of thieves used it to bolster their efforts to steal from millions of online bank accounts in Australia and other countries.

Those conclusions and other details emerged from interviews with researchers at cyber-security firms who studied the events and analysed versions of the attack code.

Microsoft confirmed the sequence of events.

The tale began last July, when Ryan Hanson, a 2010 Idaho State University graduate and consultant at boutique security firm Optiv Inc in Boise, found a weakness in the way that Microsoft Word processes documents from another format. That allowed him to insert a link to a malicious programme that would take control of a computer.

Combining flaws
Hanson spent some months combining his find with other flaws to make it more deadly, he said on Twitter. Then in October he told Microsoft. The company often pays a modest bounty of a few thousands dollars for the identification of security risks.

Soon after that point six months ago, Microsoft could have fixed the problem, the company acknowledged. But it was not that simple. A quick change in the settings on Word by customers would do the trick, but if Microsoft notified customers about the bug and the recommended changes, it would also be telling hackers about how to break in.

Alternatively, Microsoft could have created a patch that would be distributed as part of its monthly software updates. But the company did not patch immediately and instead dug deeper. It was not aware that anyone was using Hanson's method, and it wanted to be sure it had a comprehensive solution.

"We performed an investigation to identify other potentially similar methods and ensure that our fix addresses [sic] more than just the issue reported," Microsoft said through a spokesman, who answered emailed questions on the condition of anonymity. "This was a complex investigation."

Hanson declined interview requests.

The saga shows that Microsoft's progress on security issues, as well as that of the software industry as a whole, remains uneven in an era when the stakes are growing dramatically.

The United States has accused Russia of hacking political party emails to interfere in the 2016 presidential election, a charge Russia denies, while shadowy hacker groups opposed to the US government have been publishing hacking tools used by the Central Intelligence Agency and National Security Agency.

Attacks begin
It is unclear how the unknown hackers initially found Hanson's bug. It could have been through simultaneous discovery, a leak in the patching process, or even hacking against Optiv or Microsoft.

In January, as Microsoft worked on a solution, the attacks began.

The first known victims were sent emails enticing them to click on a link to documents in Russian about military issues in Russia and areas held by Russian-backed rebels in eastern Ukraine, researchers said. Their computers were then infected with eavesdropping software made by Gamma Group, a private company that sells to agencies of many governments.

The best guess of cyber-security experts is that one of Gamma's customers was trying to get inside the computers of soldiers or political figures in Ukraine or Russia; either of those countries, or any of their neighbours or allies, could have been responsible. Such government espionage is routine.

The initial attacks were carefully aimed at a small number of targets and so stayed below the radar. But in March, security researchers at FireEye Inc noticed that a notorious piece of financial hacking software known as Latenbot was being distributed using the same Microsoft bug.


FireEye probed further, found the earlier Russian-language attacks, and warned Microsoft. The company, which confirmed it was first warned of active attacks in March, got on track for an April 11 patch.

Then, what counts as disaster in the world of bug-fixers struck. Another security firm, McAfee, saw some attacks using the Microsoft Word flaw on April 6.

After what it described as "quick but in-depth research," it established that the flaw had not been patched, contacted Microsoft, and then blogged about its discovery on April 7.

The blog post contained enough detail that other hackers could mimic the attacks.

Other software security professionals were aghast that McAfee did not wait, as Optiv and FireEye were doing, until the patch came out.

McAfee Vice President Vincent Weafer blamed "a glitch in our communications with our partner Microsoft" for the timing. He did not elaborate.

By April 9, a programme to exploit the flaw was on sale on underground markets for criminal hackers, said FireEye researcher John Hultquist.

The next day, attacks were mainstream. Someone used it to send documents booby-trapped with Dridex banking-fraud software to millions of computers in Australia.

Finally, on the Tuesday, about six months after hearing from Hanson, Microsoft made the patch available. As always, some computer owners are lagging behind and have not installed it.

Ben-Gurion University employees in Israel were hacked, after the patch, by attackers linked to Iran who took over their email accounts and sent infected documents to their contacts at technology companies and medical professionals, said Michael Gorelik, vice president of cyber security firm Morphisec.

When Microsoft patched, it thanked Hanson, a FireEye researcher and its own staff.

A six-month delay is bad but not unheard of, said Marten Mickos, chief executive of HackerOne, which coordinates patching efforts between researchers and vendors.

"Normal fixing times are a matter of weeks," Mickos said.

Privately-held Optiv said through a spokeswoman that it usually gives vendors 45 days to make fixes before publishing research when appropriate, and that it "materially followed" that practice in this case.

Optiv is now comparing the details of what Hanson told Microsoft with what the spies and criminals used in the wild, trying to find out if the researcher's work was partly responsible for the worldwide hacking spree, the spokeswoman said.

The spree included one or more people who created a hacking tool for what FireEye's Hultquist said is probably a national government - and then appearing to double-dip by also selling it to a criminal group.

If the patching took time, others who learned of the flaw moved quickly.

On the final weekend before the patch, the criminals could have sold it along to the Dridex hackers, or the original makers could have cashed in a third time, Hultquist said, effectively staging a last clearance sale before it lost peak effectiveness.

It is unclear how many people were ultimately infected or how much money was stolen.
refer from gadgets 360

Tuesday 25 April 2017

85% enterprises will adopt Windows 10 by 2017 end

Nearly 85 per cent of enterprises are expected to adopt the Windows 10 operating system by the end of this year, market research firm Gartner predicted on Tuesday. According to the survey that involved six countries including India, most of the organisations are recognising the need to migrate to Windows 10.



“Large businesses are either already engaged in Windows 10 upgrades or have delayed upgrading until 2018. This likely reflects the transition of legacy applications to Windows 10 or replacing those legacy applications before Windows 10 migration takes place,” said Ranjit Atwal, Research Director at Gartner, in a statement.

Forty nine per cent of respondents said that the security improvements in Windows 10 drove them for the migration, while 38 per cent of the respondents said that it was cloud integration capabilities that prompted them to adopt this OS.

However, budgetary approval is not straightforward because Windows 10 is not perceived as an immediate business-critical project. “It is not surprising that one in four respondents expect issues with budgeting,” said Atwal.
The survey further noted that respondents’ intention to purchase convertible notebooks increased as organisations shifted from the testing and pilot phases into the buying and deployment phases.
Reffers from financial express

Google targets ‘fake news,’ offensive search suggestions in search

Google is making changes to its search in order to fight fake news, and offensive suggestions in auto-complete. Google has sprinkled some new ingredients into its search engine in an effort to prevent bogus information and offensive suggestions from souring its results.


The changes have been in the works for four months, but Google hadn’t publicly discussed most of them until now. The announcement in a blog post Tuesday reflects Google’s confidence in a new screening system designed to reduce the chances that its influential search engine will highlight untrue stories about people and events, a phenomenon commonly referred to as “fake news.”
“It’s not a problem that is going to go all the way to zero, but we now think we can stay a step ahead of things,” said Ben Gomes, Google’s vice president of engineering for search.

CORRECTING AUTOCOMPLETE

Besides taking steps to block fake news from appearing in its search results, Google also has reprogrammed a popular feature that automatically tries to predict what a person is looking for as a search request as being typed. The tool, called “autocomplete,” has been overhauled to omit derogatory suggestions, such as “are women evil,” or recommendations that promote violence.

Google also adding a feedback option that will enable users to complain about objectionable autocomplete suggestions so a human can review the wording.

Facebook, where fake news stories and other hoaxes have widely circulated on its social network, also has been trying to stem the tide of misleading information by working with The Associated Press and other news organizations to review suspect stories and set the record straight when warranted. Facebook also has provided its nearly 2 billion users ways to identify posts believed to contain false information, something that Google is now allowing users of its search engine to do for some of the news snippets featured in its results.

WHY GOOGLE CARES

Google began attacking fake news in late December after several embarrassing examples of misleading information appeared near the top of its search engine. Among other things, Google’s search engine pointed to a website that incorrectly reported then President-elect Donald Trump had won the popular vote in the US election , that President Barack Obama was planning a coup and that the Holocaust never occurred during World War II.

Only about 0.25 percent of Google’s search results were being polluted with falsehoods, Gomes said. But that was still enough to threaten the integrity of a search engine that processes billions of search requests per day largely because it is widely regarded as the internet’s most authoritative source of information.
“They have a lot riding on this, reputation wise,” said Lucy Dalglish, who has been tracking the flow of false information as dean of the University of Maryland’s journalism department. “If your whole business model is based turning up the best search results, but those results turn up stuff that is total crap, where does that get you?”

To address the problem, Google began revising the closely guarded algorithms that generate its search with the help of 10,000 people who rate the quality and reliability of the recommendations during tests. Google also rewrote its 140-page book of rating guidelines that help the quality-control evaluators make their assessments.

GOOGLE AS REFEREE
Fighting fake news can be tricky because in some cases what is viewed as being blatantly misleading by one person might be interpreted as being mostly true by another. If Google, Facebook or other companies trying to block false information err in their judgment calls, they risk being accused of censorship or playing favorites.

But doing nothing to combat fake news would probably have caused even bigger headaches.

If too much misleading information appears in Google’s search results, the damage could go beyond harm to its reputation for reliability. It could also spook risk-averse advertisers, who don’t want their brands tied to content that can’t be trusted, said Larry Chiagouris, a marketing professor at Pace University in New York.


“Fake news is careening out of control in some people’s eyes, so advertisers are getting very skittish about it,” Chiagouris said. “Anything Google can do to show it is trying to put a lid on it and prevent it from getting out of hand, it will be seen as a good thing.”

Although it also sells ads on its other services and independently owned websites, Google still makes most of its money from the marketing links posted alongside its search results. Google says its new approach isn’t meant to placate advertisers.
Refers from ie Technology

Monday 24 April 2017

Microsoft Windows 10 Cloud minimum specs requirement leaked ahead of May 2 launch

Microsoft's rumored Windows 10 Cloud-based notebooks will compete with Google Chromebooks.


Microsoft is gearing up for an event in New York on May 2 where the company is expected to make some major announcements. While the company has been tight-lipped about the announcements it is going to make, the invite sent to media hinted at the unveiling of products aimed at the educational market. Ahead of the event, a leaked document is doing the rounds on the web that claims Microsoft is working on a cloud-based version of its Windows 10. It further reveals the company will be launching a reference hardware that will be competing with Google’s Chromebooks.

Microsoft’s much-anticipated Windows 10 Cloud is believed to be a stripped down version of the main operating system, built specifically for students. A leaked screenshot from Microsft’s document titled “Windows 10 Cloud performance”, published by Windows Central, reveals details about minimum specifications required by a hardware to run Windows 10 Cloud and the same have been compared with Chromebook specifications as well.

The benchmarks for a device, conveniently dubbed as ‘CloudBook’, running Windows 10 Cloud includes a battery life of over 10 hours and a quick 20-sec boot-up time. Other noteworthy minimum specifications required are a quad-core Intel Celeron processor or above, 4GB of RAM, 32 GB or 64GB internal storage and Fast eMMC or Solid State Drive (SSD) for storage. It also includes an optional pen or touch-support.

Refer from BER

Best Chrome Extensions to Block Ads

All publishers need to run ads to keep the lights on, but sometimes we can go too far. Opera CTO Bruce Lawson recently quoted a report to say that over 50 percent of all Internet traffic is just ads. That means that half of your limited FUP is probably wasted on advertisements. If you want to take control of this and lower your bills, then you've probably thought about installing an ad-blocker.



If you're wondering about how to block ads on the Internet, the best option is to just install an ad-blocker on your browser. For this article, we're specifically looking at ad-blockers for Google Chrome since it is the most popular Web browser, but the options and steps are pretty simple and pretty similar even for other browsers such as Safari, or Firefox.

On your phone, many popular browsers such as the Opera browser and UC Browser come with built-in adblockers, but on your PC you'll need to install an extension. We looked at some of the most popular adblock extensions available by seeing what all was being recommended by others online, looking at user reviews, and then trying out the extensions ourselves.


Here are the ad block extensions for Chrome that we liked, and why we liked them.

1) AdBlock Plus
One of the best known ad blockers on the market is AdBlock Plus or ABP. It's available on most browsers and has its own Android app as well. Setup is fast, and after that you can forget about it altogether.

ABP does allow some ads through - the advertisers have to meet some requirements to be 'non-intrusive' but you can change this in the settings. ABP also blocks video ads in YouTube, and all noisy ads, and you can set it to block tracking, malware, and social media buttons.

Get AdBlock Plus on the Chrome Web Store.

2) AdBlock
Both AdBlock, and then AdBlock Plus, came up as two separate adblockers for Firefox. When Chrome came along, AdBlock was launched for Chrome by another developer, before the AdBlock Plus team started to support the browser. And so, despite not being connected, the two most popular adblockers ended up with similar names.


AdBlock works a lot like AdBlock plus. Install, leave the defaults on and just get browsing. With AdBlock, malware protection is on from the start. You can also disable AdBlock on individual pages, not just sites, and you can see all the resources it is blocking. It also allows you to whitelist specific YouTube channels, so you can support the creators you want to.

Get AdBlock on the Chrome Web Store.

3)  Ghostery
Perhaps the most comprehensive tracker blocker available, Ghostery has a slightly involved setup process. Once you've added it to your Chrome browser, you're taken to the setup page, and shown all the different types of trackers that it can watch for, and given the option of choosing which ones to block.


Most users will typically opt to block all, but do note that this can also disrupt some site functionality, such as chat assistance on sites, or comments sections. Ghostery is extremely popular, not just for the blocking, but also the analytics it does - at any time, you can click on its icon to see how many trackers are on the site you're visiting, and get updates on what these trackers do.

Get Ghostery on the Chrome Web Store.

4) Privacy Badger
Created by the Electronic Frontier Foundation (EFF), a non-profit digital rights group based in the US, Privacy Badger isn't exactly an ad-blocker. Instead, it focuses on disallowing any visible or invisible third party scripts that can track you over the Internet. As it happens, most of these trackers are used for advertisements.


This means that Privacy Badger does not block ads that are not otherwise harmful or tracking you. As a result, some ads will still show up. But at least you'll know that companies you've never heard of aren't spying on you through ads.

Get Privacy Badger on the Chrome Web Store.

To install any of these extensions, just go to its page on the Chrome Web Store, and click on the + Add to Chrome button. Follow the on-screen instructions (if any) and you're set. Once again, publishers depend on advertising to stay in business, and if there's a publisher whose content you like, whitelist it in your adblock.
Refer from gadgets 360 

Microsoft Brings enhancements to Windows ten Mail and Calendar for Gmail Users

Microsoft recently announced that it has started rolling out new features to its Windows 10 Mail and Calendar apps for Windows 10 for Gmail users. The company has promised that the new Windows 10 and Calendar apps will start rolling out over the next few weeks to users under Windows Insider Preview programme, and will be rolled out to all Windows 10 users.



The Redmond giant is bringing features like easily tracking travel and shipping deliveries, more actionable emails, easily tracking sports events, faster search, and more for Gmail users. Notably, Microsoft had rolled out a similar update earlier for its Outlook.com accounts.

"We're now excited to bring these features to our users with Gmail accounts, so you can enjoy the best of what Windows 10 Mail & Calendar have to offer," said Vivek Kumar, Product Marketing Manager, Windows 10 Mail and Calendar apps in a blog post.


For Windows 10 Mail app, Microsoft will introduce Focused Inbox for Gmail accounts that essentially segregates mails in two folders - Focused and Others. The Focused section will include all the important mails, while the Others section will house all the not-so-important mails like newsletters, brand discount announcements etc. This is similar to Gmail's methods of segregation into Primary, Social, and Promotions sections in its mail service.

Kumar explained that the new features will be made available to Mail and Calendar users who part of Windows Insider program though adds that "not all Insiders will see the new experience on their Gmail account right away." The update will be gradual and should be available in next few weeks.

"You'll know the new experience is available for your account when you are prompted to update your Gmail account settings.
Reffers from gadgets 360

Thursday 20 April 2017

Digital India: Soon you will be able to purchase Wi-Fi data at a kirana store

The Centre for Development of Telematics (C-DoT) has developed a ‘public data office’ (PDO) technology solution to deliver low-cost Wi-Fi solutions. The mass PDO solution is priced at Rs 50,000.



Ever thought you could buy Wi-Fi data from your ‘kirana’ shop? Soon, that would be a possibility.

The Centre for Development of Telematics (C-DoT) has developed a ‘public data office’ (PDO) technology solution to deliver low-cost Wi-Fi solutions. The mass PDO solution is priced at Rs 50,000, says an Economic Times report.

C-DoT is a government-owned telecom research and development centre.

Small stores like local kirana shop – with help of PDO – will be able see Wi-Fi data through vouchers. These vouchers coukld be priced as low as Rs 10 also.

“The concept of PDO will enable even a thelawallah to sell low-cost Wi-Fi-based broadband services anywhere. Even a nearby kirana shop can resell data services for as low as Rs 10 or even less," C-DoT's executive director Vipin Tyagi told ET.

The vendor will get a tech solution pack including both software and hardware elements. It will include a Wi-Fi access point with e-KYC, one-time password authentication and a mechanism to manage service vouchers. A billing system will also accompany the package.

According to the report, the service will be available over a license-free ISM (industrial, scientific and medical) band.

For commercial production of the device, C-DoT plans to transfer the technology to nearly 20 manufacturing partners including Bharat Heavy Electricals (BHEL) and Himachal Futuristic Communications (HFCL).
According to C-DoT, in semi-urban or rural areas, the technology will be available in 2.4 GHz and 5.8 GHZ bands, which do not require any regulation for access.

Last month, the telecom regulatory authority of India (TRAI) had asked the Department of Telecom (DoT) to modify the internet service provider (ISP) permit rule and make cheap Wi-Fi devices in line with the government’s Digital India move.

The TRAI had recommended ‘public data offer aggregators’ (PDOAs) for license-free public Wi-Fi services. These could work with small public data officer for penetration of Wi-Fi.

Reffred From: moneycontrol

India ranks third in the world for most number of startups in technology

In the basement of a Bangalore building, hundreds of young Indians sit in neat rows of desks typing furiously, all dreaming of becoming the new Steve Jobs or Mark Zuckerberg. A quarter of a century after liberalization kick-started India’s economic transformation, a new generation of young people are capitalizing on their parents’ hard-won financial security to try their luck in the risky business of tech startups.

“It’s really picking up,” said Aneesh Durg, a young Indian-origin student from Chicago who came to the southern tech hub of Bangalore to help develop a device that helps blind people read written text. “It’s actually not what I expected it to be. I thought that they would be a little bit behind, but they are actually working just as hard and there’s really cool stuff coming out of India these days.”

More and more young people in the country of 1.25 billion people are opting to go it alone, in stark contrast to previous generations that valued the stability of employment above all else. India now has some 4,750 tech startups — the highest number in the world after the United States and Britain, which it is fast catching up. Success stories include Flipkart, Amazon’s rival in India, and online supermarket Big Basket.

Global product

From robots and mobile apps to smart kitchens and a cocktail-making machine the cavernous Bangalore office, which houses one of India’s biggest startup incubators, is a veritable ideas factory. Every meeting room bears a photo of a successful technology entrepreneur.

Vikram Rastogi is a robotics expert who set up a small incubator named Hacklab after visiting the prestigious Massachusetts Institute of Technology in 2014. “I saw the kind of hardware work they were doing. We could also do the same kind of hardware work in India, it’s just that people do not pursue it much further,” he explains. “So I thought let me start with something in India and try to make global product out of it,” Rastogi adds.

The engineering graduate is currently working on ways to enable drones to operate as part of a fleet in order to harness more information, an application that could be used to gather data over large areas such as the vast farms of Australia or Brazil. But the path to building the next Google or Apple is not always smooth. “When I started this we had a lot of people who came to us with startup ideas,” Rastogi says, but he admits that some give up over time often due to family pressure to get a salaried job.

New generation

Sylvia Veeraraghavan, one of the millions who have migrated to Bangalore for work since the 1990s, is watching this new generation of self-starters with interest.
When she moved there, the city was becoming a outsourcing hub for Western technology companies seeking a cheap and well educated workforce through companies such as Infosys, Tata Consultancy Services and Wipro.

“For me, for the people of my time, getting a job was a very big deal. The kind of values that we used to have are very different from the values that people have today,” said Veeraraghavan, who now works for a charity after a 25-year career in IT. She believes the rising prosperity of India’s middle class has given young people the freedom to experiment.

“They are not constricted, or restricted, having to take up a job, or finding their next meal,” she said. “They can be innovative, they can be imaginative.” It is a trend that looks set to continue — according to forecasts, between 200,000 and 250,000 people will be working in tech startups by 2020, nearly double the current number, according to software industry association Nasscom.

Traditionally there has been a well-trodden path from Indian IT institutes to a master’s degree in America and then on to a plum job in Silicon Valley. But US President Donald Trump’s crackdown on immigration — including a proposed restructure of the H-1B working visas often used by tech firms to recruit foreign skilled workers — may mean even more of India’s tech stars opt to carve a new route to success at home.

It remains too early to say what impact Trump’s planned immigration reform could have on India, but for Aneesh the answer is simple. He is already confident that when he finishes his studies in Chicago, he will be heading back to India not California.

Microsoft Released app for Android, iOS, and Windows 10 called "Microsoft To-Do App"

Microsoft on Wednesday launched a new to-do app called Microsoft To-Do. The Redmond-based company describes the app as "simple and intelligent to-do list" and the preview version of app has been made available on Android, iOS, and Windows 10. Just like company's OneNote application, Microsoft To-Do will also sync the data between mobile devices and computers and will soon allow users to get same content across multiple platforms.



Microsoft To-Do, as the name suggests, is a utility-based app that allows users to set reminders, keep track of activities, and create to-do lists. "It combines intelligent technology and beautiful design to empower you to create a simple daily workflow. Organize your day with To-Do's smart Suggestions and complete the most important tasks or chores you need to get done, every day," the app's description says on App Store.


Interestingly, the new app comes from the same team that earlier created Wunderlist, another popular to-do list application Microsoft had acquired back in 2015 in a spate of acquisitions that included Sunrise Calendar and Acompli. The company has also added an Intelligent Suggestions feature that allows users to receive ideas from the app on 'what's most important'. "Just tap the lightbulb, and you'll see any to-dos from the day before, what's due or upcoming, and other helpful suggestions based on To-Do's smart algorithm. Just add the ones you want to get done to My Day," the company said in an official blog post.

On Office 365 integration, Microsoft said, "To-Do is built on Office 365, which in coming months will enable the product to be even more useful in more places. Our first integration with Outlook makes it easy to stay on top of your Outlook Tasks from anywhere. It will automatically sync your Tasks with To-Do, and allow you to access and manage them across devices.

refer from- Gadgets360

Google quickly disables ‘not cellular-friendly’ label in search outcomes due to bug

Google is fixing the problem and will fix the label after the issue is resolved.
Google has validated that they have quickly disabled the ‘no longer cell-friendly’ label within the cellular search outcomes as a result of a trojan horse. John Mueller of Google stated that Google has grew to become “the label off for now” but it “must be adequate quickly.”



that is in accordance with Google mislabeling pages as now not cell-pleasant over the last 24- hours in the cellular search results. Even AMP pages have been labeled as not being cellular-friendly. John Mueller said that “this can be a malicious program on our facet” and Google is working on fixing it.

here is a reveal shot of Google labeling an AMP page as no longer cellular-friendly:


however the Google cell friendly testing instrument showed it concurrently being cell friendly:






But the Google mobile friendly testing tool showed it at a similar time as being mobile friendly



So that is clearly a bug, Google stated it is a matter on their finish, and for now, they've became off the label from displaying in the search results until Google fixes the problem.

Monday 17 April 2017

protecting tradmarks and logos on the web

With increased penetrating online presence, corporations change into prone to totally different varieties of on-line infringement and model abuse, similar to sale of counterfeit products in the course of the internet and malpractices employed in search engine marketing, unsolicited email, phishing, cyber squatting, brand jacking, and many others. internet identities are fluid and will also be morphed any time, leaving proper-holders in the lurch in relation to securing strong proof towards the infringes. this article talks about how one can protect your model and trademark online.

With the upward push of the internet traditional brick-and-mortar businesses discovered a possible instrument to enlarge their attain on a digital platform that used to be no longer best open, unregulated and versatile however had tremendous doable in the case of how firms might make the most of their instruments and key strengths.
on-line presence is now perceived as a natural extension of, and vital to the business enlargement methods of firms. Most corporations do that by way of putting in place a website that highlights the firm’s industry objectives, objectives and its products/services and products. This content is on a regular basis hosted on a 2nd-level area title that's purchased via one of the crucial industrial service providers (called registrars) dealing in shopping for and promoting of domains – for instance, GoDaddy, network solutions, and so forth.
on-line brand abuse of this nature can land trade owners in scandals and messy prison disputes, with consumers leveling allegations in opposition to the official brand-house owners for faulty merchandise, faulty services and products, etc. faced with such a state of affairs, it's no more feasible for companies to completely reply on conventional trademark protection laws and methods to protect their manufacturers; a holistic and powerful trademark protection technique needs to be centered in location to fortify regular legal IP mechanisms to tackle such unpleasant scenarios.

domain name as a Trademark and the need for defense
A duly registered domain identify cannot handiest act as a navigator on your site, however can be the “digital face” of your enterprise, let global accessibility of your products and services, and in addition give protection to you from unauthorized use of your area identify by means of 1/3 parties.
It does need to fulfill sure criteria to be registered though; just like emblems, a domain name should be unique so that you can distinguish and establish your items/services from that of other firms, must now not be ambiguous, and can even be principally distinctive from different neatly-identified emblems on the net in order that it does give upward push to confusion, errors, deception, and many others. It should additionally, like a standard trademark, no longer be one who violates public order or morality. The rising magnitude of domains being identified at par with emblems used to be seen by the Supreme court of India in Satyam Infoway Ltd. vs. Sifynet options Pvt. Ltd.
domain name contains an internet Protocol (IP) address, the place the title portion of the area title is called the 2nd-degree name, to be created or chosen through the applicant/entrepreneur. the end component of the area title is termed as the highest-degree domain (TLD), and is additional categorized into everyday high-degree Domains (gTLDs) and the country-Code prime-degree Domains (ccTLDs). at the moment, one of the TLDs popularly is use are .com; .org; .internet; .gov; .in, and many others.
Recognizing that the web was once quick getting saturated with these common domain names, the web corporation for Assigned Names and Numbers (ICANN), a non-profit organization overseeing administration of internet domains, took the decision so as to add more high-stage domains, and due to this fact on January 12, 2012 it invited applications for brand new popular prime-degree domains. These new applications embody terms reminiscent of .advertising; .search; .app; .social; .chevrolet; .toshiba; .legislation; .tickets; .cafe; .bridgestone and lots of others making up the 1,930 applications obtained with the aid of ICANN.
As increasingly folks flock to get their domain names registered and the opportunity of the identical being licensed looms large, on-line abuse instances underneath these thousand and so domains can even rise exponentially. along with the woes listed to start with of this text, there arises major issues of spamming, spoofing and a host of fraudulent actions that may take place the usage of one of these newly launched domain names.
some of the most prominent online brand and trademark safety strategies had been mentioned under:
safety strategies
1. Register your trademark in the Trademark Clearinghouse – The Trademark Clearinghouse, a new addition with the introduction of the ngTLDs, can act as a watch tool on behalf of ICANN of owners conserving registered emblems (the usage of which has been proven) by means of notifying the 1/3-birthday party applicant of 2nd-stage domain names similar to the one registered in the TMCH, and if the applicant nonetheless needs to move in advance with the method, the logo owner will be notified, following which the trademark proprietor can take appropriate motion.

2. Register Your area title Pre-emptively – This is among the perfect tips on how to stop somebody from registering a brand as a site title beneath the new ngTLDs; brand owners can in most cases partake in daybreak classes ranging between 30-60 days by way of registering domain names just like trademarks within the Trademark Clearinghouse on a priority basis. This unquestionably gives brand homeowners a definitive advantage over most people.
three. reveal area name labels – you will need to reveal infringing domains carefully; infringers intentionally bask in typosquatting (deliberately spelling a trademark fallacious or inserting a typographical error in a website name) to attract visitors to their web pages.
four. Register all TMCH registered trademarks below the area safe marks record – The area name protected listing (DMPL), a blockading carrier initiated by means of Donuts that utilized for greater than 300 ngTLDs, by which brand homeowners can reserve their marks under the checklist. So any new area title sought to be registered with an similar 2d degree area title of a registered trademark of a model proprietor underneath DMPL shall be immediately blocked.
5. File UDRP actions against infringing domain names – The Uniform area title Dispute resolution policy (UDRP) so as to now govern dispute lawsuits below the gTLDs, can pressure switch of a domain identify to a brand owner or even cancellation, should the complainant succeed in the court cases. The time frame of resolving such disputes is less than three months and significantly inexpensive than the traditional litigation process.
6. Take movements in opposition to infringing parties underneath URS – The Uniform speedy Suspension, a cheaper different to UDRP can also be resorted to; this on the other hand, will simplest lead the infringing domain identify to be left in suspension (rendering it inactive and un-usable via any individual). If as a model owner you are in a hurry for some sort of aid, this can be a just right possibility.
In India, the nationwide internet trade of India (NIXI) governs management of domains below the unrestricted domains (.in, co.in, net.in, org.in, etc.) as well as limited domains like ac.in, edu.in, gov.in, and so forth. The arbitration process underneath INDRP (IN domain identify Dispute decision policy) is similar to that below UDRP and URS. at the moment, the price for submitting a criticism underneath the identical is Rs.30, 000/- plus a charge of Rs.2000/- for personal hearing (most two hearings).
common protection Measures
1. establish a website identify policy/process in place to your firm – Having in place written policies/methods pertaining to purchase and safety of domain names in addition to their safety from abuse, is a should for firms. this will likely require the coordination of quite a lot of departments/units within the company – the IT department, advertising and marketing, security, logistics and the felony devices.
2. Register key domain names and register early – corporations will have to register best those key suits and customary misspellings of the manufacturers which are most recurrently used and searched (.com, .internet, .org), and people conducting trade out of doors the U.S. or taking a look to take action in future must register domains attaching the correct ccTLD (for instance, .in for India). it's best to move for protective registration than later become involved in criminal disputes over the same. also, the earlier the area title gets registered, higher safety it receives. that you would be able to hire specialized services for a similar who can work in tandem with your legal division to observe any new fascinating domain names as neatly to become aware of infringers.
3. Renew domain names well timed – companies should renew their domain names periodically; for core domains (these that includes on the company web site etc) an computerized renewal machine may be arranged. you want to also buy these domain names for a duration of a number of years at a time.
four. engage with customers instantly thru social media systems and apps– at the present time it is not uncommon for celebrities and other excessive profile personalities to take care of public accounts on social media platforms, the identical being Twitter, Instagram, facebook, YouTube, etc. firms can also borrow inspiration from the same and arrange their official social media page to be able to facilitate shopper interplay with the company in an instant.
Your social media web page may list worker guidelines, updates on new merchandise/products and services, maintain a file of shopper remarks (this might work each methods, although) and define their IP rights. it is advisable to do the identical through cellular apps too; you only want to make sure that the content that includes on the app does no longer violate any 1/3-birthday party rights, constantly showcases the use of your trademark and domain identify and is technically up to date and reviewed at periodic intervals.
alternative Measures
companies at the moment install and rent computerized trademark monitoring programs and services and products that assist stop registration of confusingly equivalent or equivalent marks by 0.33 parties as well ship throughout signals to such 1/3 parties about such logos being properly defended. Some businesses have surveillance mechanisms in situation to monitor trademark use even with the aid of official third parties right from the product building stage to the purpose of sale/distribution. All types of actions that may seriously damage the popularity and integrity of the emblem are monitored- merchandising, advertising and marketing, defamatory statements in movies, blogs or another social media platform, and many others.
As a model proprietor, where you think a case of cybersquatting, hacking/phishing or other types of on-line infringement, it will be important to conduct an in-depth investigation into the identical. collect all on hand proof (from monitor shots to content on the web page and Whois records) and be sure that such evidence demonstrates intention on the part of the domain registrant to-
i) either promote, rent or switch area name registration to the trademark proprietor for considerably greater cost or a competitor
ii) Purposely misdirect web visitors by way of owning a lot of domain names that are confusingly similar to that of a trademark
earlier than you set out to sort out the infringer, you must verify with the assist of trademark attorneys the current standing of your trademark (its power and if it has been in continuous use) and the kind of protection it's lined under at the time.
which you could both go for domain name acquisition (where a transparent case of infringement does not exist) or send out assertive cease and desist letters the place the area registrant appears to be performing in unhealthy faith (you'll want to seek the advice of your attorneys when taking this step because it could contain issues of jurisdiction and cross-usa regulations could fluctuate). you could resort to litigation the place all other therapies were exhausted or if the domain name at issue does now not fall below the purview of UDRP.
As a “perfect protection measure” though, make sure that all verbal exchange relating to trade must ideally be carried out through authentic emails (and not personal ones), and change passwords at common intervals and make a selection ones which are difficult to crack and don't have any association with the person.
then again, with this penetrating on-line presence, firms are also prone to different forms of on-line infringement and brand abuse, such as sale of counterfeit merchandise in the course of the web and malpractices employed in web optimization, unsolicited electronic mail, phishing, cybersquatting, brandjacking, etc. web identities are fluid and may also be morphed any time, leaving proper-holders in the lurch when it comes to securing strong evidence against the infringers.

Thursday 13 April 2017

Your flexible SEO strategy-2017

Flexible SEO strategy: Creation, execution and measurement in an ever-changing environment.

P&P Infotech providing you news of  Columnist Janet Driscoll Miller who is discussing in this blog about top challenges SEOs are facing today and outlines why an SEO strategy has to be a living document that changes based on search trends and algorithm updates.

Like any marketing channel, SEO is an investment. Whether you’re using in-house resources or hiring an agency to do the work, SEO isn’t free. To make the most of your SEO time (and perhaps direct financial) investment, it’s helpful to have an SEO strategy established to be your road map for execution.

However, one of the bigger challenges to creating an SEO strategy is that the search engines (primarily Google) are shifting ranking factors and introducing new updates fairly regularly. Therefore, an SEO strategy has to be a living document, allowing for regular modifications as search engine requirements change.

Those strategy or tactic changes then need to be communicated with the appropriate team members. SEO involves multiple departments and disciplines across an organization — it’s larger than just the marketing department. For instance, nearly four years ago, Google indicated that links in press releases should be nofollow. In cases like that, the SEO manager would need to communicate that change to the public relations team to ensure that they are aware of how to treat links in their press releases.

what SEO challenges they are facing today, the top two issues were keeping up with Google changes and not having enough resources to execute the SEO tactics.


 if you’re handling multiple marketing responsibilities, such as email marketing, advertising and more, it can be tough to stay up to date on all of the different channels you’re working with.

And it’s no surprise that resources to execute the SEO are also challenging to come by. With SEO touching so many aspects of an organization’s marketing-related activities, it literally takes a village to execute on all of the SEO efforts that need to occur around the company.

Also daunting, however, are managing expectations (40 percent) and showing value for SEO (38 percent), which brings us back to the ROI conversation. SEO takes time, but not every CEO has the background understanding or patience to wait for results.

Ahrefs recently put out a study on how long it takes for a new web page to rank in the top 10 results on Google. One of my favorite charts from that study focuses on the search volume of the keyword in the search query and where pages ranked after one year based on the search volume of the keyword:


Google also recently put out a video which may be helpful for you to set SEO expectations with management. In the video, Maile Ohye describes how to hire an SEO, and she indicates that you should expect it to take from four to 12 months to begin to see changes after SEO efforts have been applied to a page:


Showing value, however, has its own unique set of challenges. When our webinar attendees were surveyed, one-third indicated that measuring SEO value for the organization is difficult because the SEO team doesn’t always own revenue data and other information required to truly track the ROI for SEO:


Often, marketers may not have access to certain platforms, such as CRM systems, accounting systems and more, that often house transactional and revenue data. Without access to revenue data, marketers are challenged to demonstrate a channel’s business value. Further, without demonstrating measurable ROI, how can an SEO make the business case for additional resources to execute all of the SEO tactics? It’s really a catch-22.

When it comes to measuring ROI for SEO, I generally recommend the “crawl before you walk” approach. Don’t try to do it all overnight, but go as far as you can with measurement. I created a downloadable ROI workbook in Excel that will help you auto calculate your ROI for any channel.

If you can’t fill in all of the columns now, it’s OK! Just go as far as you can to the right of the workbook. The more data you can fill in, the closer you will get to measuring your true SEO ROI and value. And in the meantime, you can see what data you’re missing — and you can ask for that specific data from its owner.

Finally, we asked respondents how often they update their SEO strategy:


I was surprised to learn that 33 percent have never reviewed their SEO strategy. Given the rapid pace of change in organic search, I certainly wouldn’t have expected such a high percentage. But it’s easy to feel lost when you’re lacking resources or don’t have confidence in your measurements. How can you have an effective strategy if you can’t measure the outcome of your efforts?

While you’re creating your SEO strategy and updating it regularly, make sure that you also are auditing your analytics and tracking regularly. Be sure to educate your team about documentation and using features like Google Analytics’ annotations, so that when changes are made to the tracking, you can see why certain anomalies may exist in your dataset.

Also consider how you currently track your marketing channels. If you’re a B2B, for instance, and use a CRM tool, are you tracking the lead source of organic search? How often does the lead source field update? Consider your attribution method.

Once you have thorough tracking in place and have confidence in your data, forming, an effective strategy (and tactics to support that strategy) will be easier to measure as you regularly adapt the strategy to the meet the changing requirements of the search engines.

Referred from sej.


How to install Windows 10 updates without an internet connection

 When Microsoft launched the Windows 10 operating system in 2015, they promised yearly updates. Microsoft focused on the point that Windows 10 is not an OS but a service. It will be supported regularly throughout its lifecycle. Windows 10 got some new additions to its features list in the Anniversary Update in mid-2016. It is 2017 now and Microsoft has released the Creators Update for Windows 10.

The updates on Windows 10 are always released in phases, with the flagship laptops receiving it first followed by less capable devices. The update roll-out also depends on the make and manufacturer of your computer. There are some people who like to wait till their computer notifies them about the update. However, some like to try it out before the rest of the world catches up. It may also happen that your Windows 10 PC isn’t connected to an internet connection at all or uses a metered connection from your smartphone. So, is there any way to get Windows updates for your computer without it being connected to fast or no internet connection?

Yes, you can. Microsoft has a tool specifically built for this purpose and it’s known as the Media Creation Tool.

The concept of the Media Creation Tool is very simple – you can download a legitimate copy of Windows 10 with the latest update on another PC with internet connection and install it on your PC through a removable media like a DVD or a USB flash drive. However, you should have a licensed copy of Windows 10 pre-installed on your PC. The tool gives you an option to either install the downloaded files on your PC as an update or perform a clean installation through ISO files. Since we are looking to keep our files and settings most of the time, updating is the PC is the best way to go. The tool can be downloaded for free from Microsoft’s website and is fairly simple to use.

Note: You need to have a USB flash drive plugged in your computer. Remember that this process will erase all other data before downloading the file on the flash drive, so take a backup of the existing data on the flash drive. If there’s any other flash drive attached to the computer, you will get an option to choose your desired flash drive.


1. Download the Media Creation Tool from Microsoft’s website. It is available for free and weighs around 18MB. Install it on a PC with an internet connection. Note that you need to have Administrator access on the PC you are downloading the files. You will also need to accept the terms and conditions of the Media Creation Tool before progressing.

2. After installation, you will be asked to either “Upgrade this PC now” or “Create installation media for another PC”. Choose the “Create installation media for another PC” and click “Next”.



3. You will have to select the language, edition and architecture of the Windows 10 you want to download. Click on “Next” after choosing the option



4. You will be given an option to choose the media for downloading the files. If you use a USB flash drive, ensure that it has a capacity of at least 8 GB. Or you can create an ISO file, which you can burn to a DVD later. As per our trial, the “USB flash drive” option is faster to download as well as install. Click “Next” after selecting the USB option.


5. You will see the download screen with the percentage of files downloaded on the PC. Wait until the download reaches 100%.


6. Once finished, you will be greeted with a message - “Your USB Flash Drive is ready”. You can also make multiple copies of the downloaded files to other flash drives.


Now plug-in the USB flash drive to your Windows 10 computer. Open the folder in the drive and select the “Setup” file to start the installer. Upon opening, select the “Install updates now” option and Windows will start installing the updates. Wait for the installation to finish and after that, you are on the latest version of Windows 10.
Referred from-deccanchronicle.com 

Monday 10 April 2017

Google Introduces AI for Its Android Services That Learns from You Without Compromising Privacy

Google, the company that rules the internet, is now testing a method to leverage its machine learning with its ubiquitous presence on mobile devices. The new model they're employing is called Federated Learning, and it hopes to apply artificial intelligence to Google's services on Android without compromising user privacy.
The Federated Learning model would be downloaded directly onto a mobile device. It would then learn from data gathered by Google's apps and services, and apply this knowledge as an update to improve the experience on your phone.
Fairly straightforward so far, right? But the trick would be gathering and using this data without compromising the user's privacy. To accomplish that, the information is encrypted, anonymized, and aggregated with other users' data before being analyzed in the cloud. The combined user data is then used to improve the base model of Google's ecosystem.
But before the aggregated data is used to improve Google services on the whole, a bit of machine learning is applied locally to enhance your personal experience. This act takes place strictly on your phone, and is not shared with Google's cloud-based AI until after it's been anonymized and combined with other users' data.
The improvements made by the local AI will happen immediately, "powering experiences personalized by the way you use your phone."


On that front, the research currently being done involves the Gboard virtual keyboard app on Android. Following the Federated learning model previously described, Venture Beat explains:

To sum it up, research scientists Brendan McMahan and Daniel Ramage stated in a blog post that "Federated Learning allows for smarter models, lower latency, and less power consumption, all while ensuring privacy."


Not edited by us

What Are Some Tips For Making Marketing Ads?

  Did you know that people who are interested in ads are 50% more likely to buy a product than organic visitors? If you are willing to creat...