Aug 302012
 

Facebook page owners with more than 5,000 fans will soon have access to advanced post targeting options including age, gender, relationship status and education.Facebook began testing this last month, but only a small percentage of pages had access to the additional targeting parameters. Today some marketers received an update from Facebook saying that all pages over 5,000 Likes will get the option this week. Our own InsideFacebook.com page showed the following prompt this afternooon:

MORE:  New page post targeting options coming to all Facebook pages over 5,000 Likes.

 


Aug 292012
 

Last week’s feature explaining why passwords are under assault like never before touched a nerve with many Ars readers, and with good reason. After all, passwords are the keys that secure Web-based bank accounts, sensitive e-mail services, and virtually every other facet of our online life. Lose control of the wrong password and it may only be a matter of time until the rest of our digital assets fall, too.

Take, for example, the hundreds of millions of WiFi networks in use all over the world. If they’re like the ones within range of my office, most of them are protected by the WiFi Protected Access or WiFi Protected Access 2 security protocols. In theory, these protections prevent hackers and other unauthorized people from accessing wireless networks or even viewing traffic sent over them, but only when end users choose strong passwords. I was curious how easy it would be to crack these passcodes using the advanced hardware menus and techniques that have become readily available over the past five years. What I found wasn’t encouraging.

First, the good news. WPA and WPA2 use an extremely robust password-storage regimen that significantly slows the speed of automated cracking programs. By using the PBKDF2 key derivation function along with 4,096 iterations of SHA1 cryptographic hashing algorithm, attacks that took minutes to run against the recent LinkedIn and eHarmony password dumps of June would require days or even weeks or months to complete against the WiFi encryption scheme.

What’s more, WPA and WPA2 passwords require a minimum of eight characters, eliminating the possibility that users will pick shorter passphrases that could be brute forced in more manageable timeframes. WPA and WPA2 also use a network’s SSID as salt, ensuring that hackers can’t effectively use precomputed tables to crack the code.

That’s not to say wireless password cracks can’t be accomplished with ease, as I learned firsthand.

MORE:  How I cracked my neighbor’s WiFi password without breaking a sweat | Ars Technica.

 


Aug 292012
 

If you are an agency or a brand trying to decide whether or not social media marketing is worth the investment, consider these numbers from recent studies of social media users:

  • 78% are directly influenced by branded posts when making purchases
  • 74% encourage friends to try new products
  • 80% try new things based on friends’ suggestions

MORE:  Why Social Marketing Will Deliver Positive ROI for Your Brand – Adrants.

 


Aug 292012
 

The next time Facebook sends you an email about a friend tagging you in a new picture, be cautious — it could be a trap.

A new strain of malware identified by security firm Sophos as Troj/Agent-XNN has been circulating the social networking site, encouraging members to view photos as an attachment. After clicking on the infected link — which is disguised as a Facebook notification email — a ZIP file containing malware allows hackers to gain control over Windows-operated computers.

Although Facebook email notifications typically tell you which friends tagged you in a picture, this malware campaign states “one of your friends added a new photo with you to the album.”

MORE:  Watch Out for This Sneaky Facebook Scam Disguised as a Photo Notification.

 


Aug 282012
 

Apple has now identified eight of Samsung’s devices that it wants to have banned from sale in the US following its patent victory last week. But while the jury in Apple’s court case against Samsung said Samsung had willfully infringed in most cases, Apple has apparently focused its attention on devices that are mostly unavailable in the US already.

Apple’s list of devices it wants to ban, published on Monday afternoon, is as follows:

Galaxy S 4G

Galaxy S2 AT&T

Galaxy S2 Skyrocket

Galaxy S2 T-Mobile

Galaxy S2 Epic 4G

Galaxy S Showcase

Droid Charge

Galaxy Prevail

MORE: Ban this: Apple lists 8 Samsung devices it wants kept out of the US | Ars Technica.

 


Aug 282012
 

The bulk of the companies here at the Republican National Convention are traditional media firms with dedicated spaces for their reporters to crank out stories about the big event. Then there are Twitter and Facebook. The two social media outfits are sharing a space upstairs and around the corner from a much larger area rented out by Bloomberg.

And why not? More and more, when people look for political information or post politics-related content, they do it on both platforms. The company names are synonymous with social media, and that’s partially why Twitter and Facebook decided to bunk together here at the RNC.

“We’re both here with the same mission. Our goals here are the same – to facilitate open engagement,” said Adam Sharp, who heads up Government, News, and Social Innovation at Twitter. “Obviously our companies have ways in which we compete, but it’s not a zero sum game,” continued Sharp.

Meanwhile Google – one of the only other “non-media” firms here (if it can still be called that) – has taken over a massive space on the main floor of the Tampa Convention Center, complete with primary colored walls, interactive experiences, and a coffee bar dishing out free cappuccinos for the caffeine-quaffing journalists embedded nearby.

MORE:  Twitter and Facebook Get Cozy at Republican Convention | ClickZ.

 


Aug 272012
 

Freelancing in web design and development is often a balancing act. You must carefully divide your time between doing work, getting more work, and ensuring you’re getting paid for said work. For each of these tasks, a huge range of tools exists – but it’s tough to know whether you’re using the best ones available.

We asked a number of leading designers to provide us with their favourites, so you can ensure your survival toolkit is the equivalent of a super-powered laser-armed jetpack, rather than a digital abacus.

In terms of approach, two distinct methodologies are clear. Some people, such as freelance web designer John Alex Jacob, favour a pared-down toolkit: “The way I do business has changed a lot this past year,” he tells .net. “I’ve been trying to keep things as simple as possible for my clients and me, improve efficiency and avoid unnecessary distractions while working.” He therefore advocates minimising what’s installed on your computer.

Others, however, advise exploring the diverse range of single-task indie apps and online services now available, in order to potentially boost productivity. Regardless of your own approach, we hope you find inspiration and exciting new tools in the selections provided by those we spoke to.

MORE:  The ultimate freelance web design tools | Feature | .net magazine.

 


Aug 272012
 

A vulnerability in the latest version of Oracle’s Java software framework is under active attack, and the damage is likely to get worse thanks to the availability of reliable exploit code that works on a variety of browsers and computer platforms, security experts warn.

The flaw in Java version 1.7 was reported on Sunday afternoon by FireEye security researcher Atif Mushtaq. A separate post published on Monday by researchers Andre M. DiMino and Mila Parkour said the number of attacks, which appear to install the Poison Ivy Remote Access Trojan, were low. But they went on to note that the typical delay in issuing Java patches, combined with the circulation of exploit code, meant it was only a matter of time until the vulnerability is exploited more widely by other attackers.

Members of Rapid7, the security company that helps maintain the open-source Metasploit exploit framework used by penetration testers and hackers, said they have already developed an exploit that works against Windows 7. They are in the process of testing it against the Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome browsers running on other operating systems, including Ubuntu Linux 10.04 and Windows XP. They went on to suggest that users should disable Java until a patch plugging the gaping hole is released.

“As a user, you should take this problem seriously, because there is currently no patch from Oracle,” a Rapid7 exploit developer wrote in a blog post. “For now, our recommendation is to completely disable Java until a fix is available.”

MORE:  Critical flaw under active attack prompts calls to disable Java | Ars Technica.

 


Aug 272012
 

The top sales executive credited with building Groupon’s national sales team has left the company, Groupon confirmed Friday. The departure of Lee Brown, head of national sales, came just two days after the Wall Street Journal reported that Groupon’s top saleswoman, Jayna Cooke, is also leaving the company.

Raj Ruparell, a four-month employee who was previously working on Groupon Goods, has replaced Brown effective immediately, a Groupon spokesperson confirmed. Brown joined the company in 2010 from Yahoo.

Following its initial public offering a little more than nine months ago, Groupon’s stock tanked 83 percent to an all-time low of $4.46 on Friday. Company stock spiked to $26.19 exactly two weeks after it went public and it has steadily declined ever since. Barely a year has passed since Groupon was routinely regarded as one of the fastest growing companies ever. The company, which gained prominence through its daily deals business, has suffered a series of key personnel departures and investors are reacting negatively to its latest earnings report.

MORE: Groupon’s National Sales Chief Leaves Company | ClickZ.

 


Aug 272012
 

Of course, you don’t want to avoid social, but you should try to pull those customers ready for a deeper relationship into your email campaigns. Tactically, this is simple. You can post a message leading to your newsletter, or host a form field right there in the social platform.

But you’ll need a good reason for an engaged social follower to become an email subscriber. You need to show not just the value of your emails, but appeal to the unique social character of that follower. And guess what — not all followers are the same.

MORE:  How to turn social followers into email subscribers – iMediaConnection.com.