Remove 12
article thumbnail

Predictions 2014: A Difficult Year To See

John Battelle's Searchblog

The post Predictions 2014: A Difficult Year To See appeared first on John Battelle's Search Blog. But gazing into 2014 has been the hardest of the bunch – and not because the industry is getting so complicated. And yet somehow, this all leads me to my 2014 predictions. ” At least, I sure hope we will.

Marketing 111
article thumbnail

Who’s Behind the ‘Web Listings’ Mail Scam?

Krebs on Security

One from May 2011 at onlineprnews.com sings the praises of Weblistingsinc.info , weblistingsinc.org and web-listings.net in the same release, and lists the point of contact simply as “Mark.” Cached versions of this site from 2011 show it naming Web Listings Inc. as a business partner. That same management@helpmego.to

Sales 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

O’Neill said he opened the investigation into Ngo’s identity theft business after reading about it in a 2011 KrebsOnSecurity story, “ How Much is Your Identity Worth? Ngo says he came from a middle-class family that owned an electronics store, and that his parents bought him a computer when he was around 12 years old.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

since at least 2011. For example, DroidDream. back in 2011. For example, recently NSA-leaked exploit. It started manufacturing Android One devices in 2014 and is selling in quite a few countries besides India, most notably Russia. Encrypting malicious payload is a very old malware trick that has been used by.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

since at least 2011. For example, DroidDream. back in 2011. For example, recently NSA-leaked exploit. It started manufacturing Android One devices in 2014 and is selling in quite a few countries besides India, most notably Russia. Encrypting malicious payload is a very old malware trick that has been used by.

article thumbnail

Predictions 2015: Uber, Google, Apple, Beacons, Health, Nest, China, Adtech…

John Battelle's Searchblog

Last year, for example, I predicted that 2014 would be the year that the Internet would “adopt the planet as its cause.” A good example of this is my declaring that Twitter would become a major media platform three years ago. Related: Predictions 2014. 2014: How I Did. Predictions 2011.

Marketing 111
article thumbnail

Not a lot of news from Big Brother Watch today

Data Protector

But, and this is a big but, there are only a few pages of analysis – once you get past page 12, a series of annexes contain the responses from each local authority, revealing how minor the vast majority of the reported incidents (occurring between April 2011 and April 2014) actually were.