DHS Open Source Enterprise Daily Cyber Report

Total Page:16

File Type:pdf, Size:1020Kb

DHS Open Source Enterprise Daily Cyber Report UNCLASSIFIED This document was prepared by the Office of Intelligence and Analysis to facilitate a greater understanding of the nature and scope of threats and hazards to the homeland. It is provided to Federal, State, Local, Tribal, Territorial and private sector officials to aid in the identification and development of appropriate actions, priorities and follow-on measures. This product may contain U.S. person information that has been deemed necessary for the intended recipient to understand, assess, or act on the information provided. It should be handled in accordance with the recipient's intelligence oversight and/or information handling procedures. Some content may be copyrighted. These materials, including copyrighted materials, are intended for "fair use" as permitted under Title 17, Section 107 of the United States Code ("The Copyright Law"). Use of copyrighted material for unauthorized purposes requires permission from the copyright owner. Any feedback regarding this report or requests for changes to the distribution list should be directed to the Open Source Enterprise via unclassified e-mail at: [email protected]. DHS Open Source Enterprise Daily Cyber Report 13 December 2010 CRITICAL INFRASTRUCTURE PROTECTION: • Nothing significant to report INFORMATION SYSTEMS BREACHES: • Hackers Steal McDonald's Customer Data: McDonald's is working with law enforcement authorities after malicious hackers broke into another company's databases and stole information about an undetermined number of the fast food chain's customers. McDonald's has also alerted potentially affected customers via e- mail and through a message on its Web site. ... McDonald's hired Arc [Worldwide] to develop and coordinate the distribution of promotional e-mail messages, and Arc in turn relied on an unidentified e-mail company to manage the customer information database. This e-mail company's systems were hacked into. The data, which customers had provided voluntarily, doesn't include Social Security Numbers, credit card numbers, nor any sensitive financial information. ... This means that customer data likely includes full names, phone numbers, postal addresses and e-mail addresses. ... [A McDonald's] spokeswoman didn't say how many people are potentially affected and in what countries, besides the U.S. She also didn't say when the breach happened. [Date: 11 December 2010; Source: http://www.computerworld.com/s/article/9200918/] • Gawker Media Hacked, Firm Warns Users To Change Passwords: E-mail addresses and password details for 200,000 registered users of Gawker Media websites are now circulating on peer-to-peer networks after a weekend hack attack. The company warned users to change their passwords -- including on other sites, if they use the same passwords elsewhere. The websites affected include Lifehacker, Gizmodo, Gawker, Jezebel, io9, Jalopnik, Kotaku, Deadspin and Fleshbot. Users are required to register, providing their e-mail address and a password, in order to leave comments on those websites. A group named "Gnosis" claimed credit for the attack. The compromised information is now available in a 487 MB file, which can be downloaded from peer-to-peer networks using a torrent now indexed on The Pirate Bay. Other information in the file includes something called "gawker_redesign_beta.jpg" as well as Gawker's server kernel versions. ... The stored passwords were encrypted although Gnosis said some of the passwords have already been cracked. [Date: 13 December 2010; Source: http://www.computerworld.com/s/article/9200978/] CYBERTERRORISM & CYBERWARFARE: • Nothing significant to report VULNERABILITIES: • Overdue Patches Published For RealPlayer: RealNetworks has released a monster update that closes an impressive 27 security holes in Windows RealPlayer 11.1. Other versions, such as RealPlayer SP, RealPlayer Enterprise and the Mac / Linux versions are also partially affected. Apparently the current RealPlayer 14.0 does not exhibit any of the vulnerabilities. ... Most of the holes are related to flaws in the handling of certain multimedia formats, which cause buffer overflows and other memory management problems. Such errors can often be exploited to inject and execute malicious code; in extreme cases, computers can be infected with spy software. ... RealNetworks was notified of some of the holes six months ago, but apparently waited until now to patch older versions after the patched version 14 was published at the end of October. [Date: 12 December 2010; Source: http://www.h-online.com/security/news/item/Overdue- patches-published-for-RealPlayer-1151696.html] UNCLASSIFIED Page 1 of 2 UNCLASSIFIED • Exim Code-Execution Bug, Now With Root Access: Exim maintainers have warned of an in-the-wild attack that allowed miscreants to execute malicious code with unfettered system privileges by exploiting a bug in older versions of the open-source mail transfer agent. The memory-corruption vulnerability resides in Exim 4.69 and earlier versions, and already has been used in at least one attack to completely root an enterprise server, according to this account. Security pros have sounded the alarm because the vulnerability is remotely exploitable and is already being used maliciously. What's more, attack code has also been added to the Metasploit exploitation kit, making it easy for others to reproduce the attack. ... Maintainers for the Debian and Red Hat distributions of Linux have already issued patches, and their counterparts for other distributions are sure to follow soon. ... The vulnerability was patched in 2008, in version 4.7. But the fix was never identified as a security patch so it was never applied to older versions, which are still in wide use. [Date: 11 December 2010; Source: http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/] GENERAL CYBER/ELECTRONIC CRIME: • Twitter Diet Spam Splurge Blamed On Gawker Compromise: Compromised Twitter accounts are being abused to post spam messages promoting a diet website. Tens of thousands of messages promoting an acai berries diet website appeared on Sunday, prompting speculation that a worm was spreading across the micro-blogging service. ... [I]t seems that the compromised Twitter accounts promoting the spam messages were hit as a result of last weekend's Gawker compromise. Exposed users made the mistake of using the same login credentials for both Gawker and Twitter. The attack illustrates the importance of using different login credentials on different websites, as well as the common sense approach of using hard-to-guess passwords. Twitter has begun pushing password resets to affected accounts. The micro-blogging service blames the snafu on the Gawker compromise and bad password security rather than anything under its direct control. [Date: 13 December 2010; Source: http://www.theregister.co.uk/2010/12/13/twitter_diet_spam_gawker_compromise/] • Google, Microsoft Ad Networks Briefly Hit By Malware: For a brief period this week, cybercriminals managed to infect Google's and Microsoft's online ad networks with malicious advertisements that attacked users' PCs, according to security consultancy Armorize. The attacks started around Dec. 5 and lasted a few days, sending victims who clicked on the ads to malicious Web pages. Those pages took advantage of known software bugs to install backdoor programs that gave the attackers control of the victims' PCs, or to install software that made it appear as though the PCs were filled with malicious software. ... [Google spokesman Jay] Nancarrow wouldn't say how the malicious ads got onto Google's ad network, but Armorize Chief Technology Officer Wayne Huang [cq] said cybercriminals may have tricked Google by serving the ads from a domain similar to that used by a legitimate ad-serving company, AdShuffle, based in Irving, Texas. ... Armorize and others spotted similar ads on Microsoft's Hotmail service, according to Huang. Microsoft said via email Friday that it was looking into the matter and could not comment in time for this report. [Date: 10 December 2010; Source: http://www.computerworld.com/s/article/9200899/] • Amazon Blames Hardware – Not Hackers – For European Outage: Problems with Amazon's systems in Europe over the weekend were down to hardware failure rather than hackers, the e-commerce giant said on Sunday. Christmas shoppers trying to complete purchases from Amazon's online stores in the UK, France, Germany, Austria and Italy were locked out for around half an hour on Sunday. Amazon famously withdrew services from whistle-blower website Wikileaks at the start of the month, a move that potentially made it a target for attacks from Anonymous. However, Amazon said the temporary outage was caused by "hardware failure" at a Dublin-based hosting facility that serves the sites. ... A statement from Anonymous denied launching an attack against Amazon, arguing that such a move would be counterproductive, in PR terms, as well as difficult in practice. Amazon's distributed system makes it more resilient against distributed denial of service attacks, if not hardware failure. [Date: 13 December 2010; Source: http://www.theregister.co.uk/2010/12/13/amazon_outage_not_anonymous/] • WikiLeaks In A Dangerous Internet Neighborhood: The WikiLeaks main domain, Wikileaks.org, currently redirects to mirror.wikileaks.info. The latter site is hosted on IP address 92.241.190.202 in Heihachi Ltd. Heihachi Ltd is known as a bulletproof, black-hat hosting provider in Russia which is a safe haven for criminals and fraudsters. It hosts a long list of criminally-related domains. Among these domains are banking fraud domains, websites of carders (criminals who trade stolen credit card information), malware sites, and phishing sites. No matter what your political view is, this is rather disturbing. We at Trend Micro...don’t know whether wikileaks.org has perhaps been compromised or whether WikiLeaks is knowingly getting services from a black-hat provider. Either way we assess the wikileaks.info domain as high risk and we do not recommend visiting this site as long as it is hosted by Heihachi Ltd. [Date: 12 December 2010; Source: http://blog.trendmicro.com/wikileaks-in-a-dangerous-internet-neighborhood/] UNCLASSIFIED Page 2 of 2 .
Recommended publications
  • 18734 Homework 3
    18734 Homework 3 Released: October 7, 2016 Due: 12 noon Eastern, 9am Pacific, Oct 21, 2016 1 Legalease [20 points] In this question, you will convert a simple policy into the Legalease language. To review the Legalease language and its grammar, refer to the lecture slides from September 28. You may find it useful to go through a simple example provided in Section III.C in the paper Bootstrapping Privacy Compliance in Big Data Systems 1. A credit company CreditX has the following information about its customers: • Name • Address • PhoneNumber • DateOfBirth • SSN All this information is organized under a common table: AccountInfo. Their privacy policy states the following: We will not share your SSN with any third party vendors, or use it for any form of advertising. Your phone number will not be used for any purpose other than notifying you about inconsistencies in your account. Your address will not be used, except by the Legal Team for audit purposes. Convert this statement into Legalease. You may use the attributes: DataType, UseForPur- pose, AccessByRole. Relevant attribute-values for DataType are AccountInfo, Name, Address, PhoneNumber, DateOfBirth, and SSN. Useful attribute-values for UseForPurpose are ThirdPar- tySharing, Advertising, Notification and Audit. One attribute-value for AccessByRole is LegalTeam. 1http://www.andrew.cmu.edu/user/danupam/sen-guha-datta-oakland14.pdf 1 2 AdFisher [35=15+20 points] For this part of the homework, you will work with AdFisher. AdFisher is a tool written in Python to automate browser based experiments and run machine learning based statistical analyses on the collected data. 2.1 Installation AdFisher was developed around 2014 on MacOS.
    [Show full text]
  • North Dakota Homeland Security Anti-Terrorism Summary
    UNCLASSIFIED North Dakota Homeland Security Anti-Terrorism Summary The North Dakota Open Source Anti-Terrorism Summary is a product of the North Dakota State and Local Intelligence Center (NDSLIC). It provides open source news articles and information on terrorism, crime, and potential destructive or damaging acts of nature or unintentional acts. Articles are placed in the Anti-Terrorism Summary to provide situational awareness for local law enforcement, first responders, government officials, and private/public infrastructure owners. UNCLASSIFIED UNCLASSIFIED NDSLIC Disclaimer The Anti-Terrorism Summary is a non-commercial publication intended to educate and inform. Further reproduction or redistribution is subject to original copyright restrictions. NDSLIC provides no warranty of ownership of the copyright, or accuracy with respect to the original source material. Quick links North Dakota Energy Regional Food and Agriculture National Government Sector (including Schools and Universities) International Information Technology and Banking and Finance Industry Telecommunications Chemical and Hazardous Materials National Monuments and Icons Sector Postal and Shipping Commercial Facilities Public Health Communications Sector Transportation Critical Manufacturing Water and Dams Defense Industrial Base Sector North Dakota Homeland Security Emergency Services Contacts UNCLASSIFIED UNCLASSIFIED North Dakota Nothing Significant to Report Regional (Minnesota) Hacker charged over siphoning off funds meant for software devs. An alleged hacker has been charged with breaking into the e-commerce systems of Digital River before redirecting more than $250,000 to an account under his control. The hacker, of Houston, Texas, 35, is charged with fraudulently obtaining more than $274K between December 2008 and October 2009 following an alleged hack against the network of SWReg Inc, a Digital River subsidiary.
    [Show full text]
  • Blog Title Blog URL Blog Owner Blog Category Technorati Rank
    Technorati Bloglines BlogPulse Wikio SEOmoz’s Blog Title Blog URL Blog Owner Blog Category Rank Rank Rank Rank Trifecta Blog Score Engadget http://www.engadget.com Time Warner Inc. Technology/Gadgets 4 3 6 2 78 19.23 Boing Boing http://www.boingboing.net Happy Mutants LLC Technology/Marketing 5 6 15 4 89 33.71 TechCrunch http://www.techcrunch.com TechCrunch Inc. Technology/News 2 27 2 1 76 42.11 Lifehacker http://lifehacker.com Gawker Media Technology/Gadgets 6 21 9 7 78 55.13 Official Google Blog http://googleblog.blogspot.com Google Inc. Technology/Corporate 14 10 3 38 94 69.15 Gizmodo http://www.gizmodo.com/ Gawker Media Technology/News 3 79 4 3 65 136.92 ReadWriteWeb http://www.readwriteweb.com RWW Network Technology/Marketing 9 56 21 5 64 142.19 Mashable http://mashable.com Mashable Inc. Technology/Marketing 10 65 36 6 73 160.27 Daily Kos http://dailykos.com/ Kos Media, LLC Politics 12 59 8 24 63 163.49 NYTimes: The Caucus http://thecaucus.blogs.nytimes.com The New York Times Company Politics 27 >100 31 8 93 179.57 Kotaku http://kotaku.com Gawker Media Technology/Video Games 19 >100 19 28 77 216.88 Smashing Magazine http://www.smashingmagazine.com Smashing Magazine Technology/Web Production 11 >100 40 18 60 283.33 Seth Godin's Blog http://sethgodin.typepad.com Seth Godin Technology/Marketing 15 68 >100 29 75 284 Gawker http://www.gawker.com/ Gawker Media Entertainment News 16 >100 >100 15 81 287.65 Crooks and Liars http://www.crooksandliars.com John Amato Politics 49 >100 33 22 67 305.97 TMZ http://www.tmz.com Time Warner Inc.
    [Show full text]
  • Modified Roomba Det
    Robots: Modified Roomba Detects Stress, Runs Away When It Thinks Y... http://i.gizmodo.com/5170892/modified-roomba-detects-stress-runs-awa... IPHONE 3.0 GIZ EXPLAINS PHOTOSHOP APPLE LUNCH NSFW iPhone 3.0 Beta Giz Explains: CONTEST iPhone 3.0 OS The Genius iPhone OS 3.0 OS Walkthrough What Makes The 42 Even More Guide: Behind Will Turn Your Video Five Smartphone Ludicrous Everything You Scanwiches.com's Phone Into a Platforms Control Schemes Need to Know Juicy Sandwich Revolutionary Different Apple Might Just Porn Sex Toy Try Gizmodo ROBOTS Modified Roomba Detects Stress, Runs Away When It Thinks You Might Abuse It By Sean Fallon, 4:40 PM on Mon Mar 16 2009, 7,205 views The last thing you need when you get home is something making noise and hovering underfoot. This modified Roomba avoids users when it detects high levels of stress. Designed by researchers at the University of Calgary, this Roomba interacts with a commercial headband for gamers that detects muscle tension in the face. The more tension it detects, the farther away the Roomba will hover from the subject. The purpose of this rather simple device is to explore the potential of human and machine interaction on an emotional level. The researchers envision gadgets that approach you like a pet when it detects that you are lonely and in need of comfort. Conversely, the Roomba model could be taken a step further—imagine if it cowered under the bed when you came home drunk and angry. Then, fearing for it's life, the Roomba calls 911 and gets you thrown in the slammer for appliance abuse.
    [Show full text]
  • Newsletter CLUSIT - 31 Dicembre 2010
    Newsletter CLUSIT - 31 dicembre 2010 Indice 1. RINNOVO DIRETTIVO CLUSIT 2. FORMAZIONE NELLE SCUOLE 3. AGGIORNAMENTO QUADERNO PCI-DSS 4. CALENDARIO SEMINARI CLUSIT 2011 5. NOTIZIE DAL BLOG 6. NOTIZIE E SEGNALAZIONI DAI SOCI 1. RINNOVO DIRETTIVO CLUSIT Nel corso dell'assemblea generale dello scorso 17 dicembre, si è proceduto all'elezione del nuovo Comitato Direttivo e del suo Presidente. Riportiamo di seguito l'elenco dei nuovi eletti, con i relativi ruoli e materie di competenza. • Gigi TAGLIAPIETRA - Presidente • Paolo GIUDICE - Segretario Generale • Giorgio GIUDICE - Tesoriere e Webmaster • Luca BECHELLI - Sicurezza e Compliance • Raoul CHIESA - Sicurezza delle Infrastrutture Critiche, CyberWar • Mauro CICOGNINI - Responsabile Seminari Clusit • Gabriele FAGGIOLI - Ufficio Legale • Mariangela FAGNANI - Aspetti etici e regolamenti interni • Massimiliano MANZETTI - Rapporti con il Mondo Sanitario • Marco MISITANO - Convergence tra sicurezza fisica e sicurezza logica • Mattia MONGA - Rapporti con i CERT ed il Mondo Universitario • Alessio PENNASILICO - Security Summit, Hacking Film Festival • Stefano QUINTARELLI - Rapporti con gli operatori Telcom e ISP • Claudio TELMON - Responsabile Iniziative "Rischio IT e PMI", "Premio Tesi", "Adotta una scuola", "video pillole di sicurezza" • Alessandro Vallega - Coordinamento Gruppi di Lavoro 2. FORMAZIONE NELLE SCUOLE Come discusso durante l'ultima assemblea, stiamo attivando l'iniziativa Adotta una scuola, che mira a sviluppare un'attività di sensibilizzazione alle problematiche della sicurezza ICT presso le scuole, da parte dei soci. www.clusit.it pag. 1 [email protected] Newsletter CLUSIT - 31 dicembre 2010 Una volta che l'iniziativa sarà a regime, i soci ci potranno comunicare scuole, presumibilmente della loro area, che sono disposti ad "adottare". A seguito di questa richiesta il Clusit contatterà il preside con una lettera in cui propone l'iniziativa e "accredita" il socio che quindi, se il preside sarà d'accordo, andrà a fare uno o più interventi di sensibilizzazione sul tema della sicurezza ICT presso quella scuola.
    [Show full text]
  • Report to Congress on Gawker Media
    Report To Congress On Gawker Media An Investigation Into The Illicit Character Assassination Services Provided By Nick Denton And Gawker Media Volume 1 1 Overview Financial records, stock holdings, off-shore bank records, tax haven routing, emails, inter-party communications, PAC records, credit card records, advertising contracts and personnel records; implicate Gawker Media and campaign financiers in a clear effort to subvert the processes of Democracy. By using public resources, enhanced by tax advantages, facilities and public utility tools to manipulate public perceptions, and to attack and damage taxpaying members of the public, Nick Denton and Gawker Media have created a blight upon the public policy system, and the public communications system, of the nation, and the world. By creating an unfair system of retribution, vindictiveness and vendetta, exclusive to Gawker Media, which provides no reasonable option, nor affordable measure, for the public to counter-measure Gawker’s attacks; Gawker is violating the Constitutional and Human Rights of American citizens. Gawker Media has taken money and resources from third parties for whom Gawker Media then produced coordinated character and brand assassination attacks that harmed, or destroyed, American industry and American taxpayers. While the press may certainly have the rights to free speech and freedom of the press, the public has a reasonable expectation of security, privacy and avoidance from terrorism by that press. Nick Denton and Gawker Media have certainly engaged in terrorism
    [Show full text]
  • [Adblock Plus 2.0] ! Checksum: L6hxszcotronlimnb5syiw ! Title
    [Adblock Plus 2.0] ! Checksum: L6hxsZcoTRoNliMnB5SYiw ! Title: Hulu ! Last modified: 18 May 2013 16:41 UTC ! Expires: 1000 days (update frequency) ! Homepage: https://easylist.adblockplus.org/ ! Licence: https://easylist-downloads.adblockplus.org/COPYING ! ! Please report any unblocked adverts or problems ! in the forums (http://forums.lanik.us/) ! or via e-mail ([email protected]). ! !-----------------------General advert blocking filters-----------------------! ! *** easylist:easylist/easylist_general_block.txt *** &ad_box_ &ad_channel= &ad_classid= &ad_height= &ad_keyword= &ad_number= &ad_type= &ad_type_ &ad_zones= &adbannerid= &adcount= &admeld_ &admid= &adname= &adnet= &adpageurl= &adsafe= &adserver= &adsize= &adslot= &adslots= &adsourceid= &adspace= &adstype= &adType=PREROLL& &adunit= &adurl= &adv_keywords= &advert_ &advertiserid= &advtile= &adzone= &banner_id= &bannerid= &clicktag=http &customSizeAd= &gIncludeExternalAds= &googleadword= &jumpstartadformat= &largead= &popunder= &program=revshare& &prvtof=*&poru= &show_ad_ &simple_ad_ &smallad= &type=ad& &video_ads_ &videoadid= &view=ad& +advertorial. +adverts/ -2/ads/ -2011ad_ -300x100ad2. -ad-001- -ad-180x150px. -ad-340x400- -ad-banner. -ad-big. -ad-bottom- -ad-button- -ad-choices. -ad-column- -ad-ero- -ad-exo- -ad-home. -ad-iframe/ -ad-large. -ad-left. -ad-limits. -ad-loading. -ad-manager/$~stylesheet -ad-marker. -ad-new_ -ad-right. -ad-server/ -ad-tile. -ad-top. -ad-unit. -ad-unit/ -ad-util- -ad-util. -ad-vertical- -ad-zone. -ad.jpg? -ad.jsp| -ad.php? -ad/right_
    [Show full text]
  • The Weird History of Usamerican Fascism: a Guide (1979-2019) Phd in Critical and Cultural Theory 2019 M.C
    The Weird History of USAmerican Fascism: A Guide (1979-2019) PhD in Critical and Cultural Theory 2019 M.C. McGrady Summary The future, as ever, can be read in comic books. Foretold by the Dark Age of Comics, the doom that now comes to Earth arrives in the form of self-realizing eschatologies, horrors born out of the rutting between unfettered capitalism and its favorite child, technological hubris. When the Big Two comic book publishers began hiring British and Irish authors en masse over the course of the 1980s, these writers brought with them a critical eye sharpened by the political and economic cruelty of the decade. The victims of the Iron Lady came to the New World and set their sights on the empire of the Teflon President, using superhero stories to explore the ideological weapons deployed in the service of global capitalism. The Weird History of USAmerican Fascism tracks the interrelated networks of popular culture and fascism in the United States to demonstrate the degree to which contemporary USAmerican politics embodies the future that the fictional dystopias of the past warned us about. Although the trans-Atlantic political developments of 2016 and their aftermath have sparked a widespread interest in a resurgent Anglophone fascism and its street-level movements – seen most obviously in the loose collection of white supremacists known as the ‘alt- right’ – this interest has been hamstrung by the historical aversion to a serious study of popular and ‘nerd’ culture during the twentieth century. By paying attention to the conceptual and interpersonal networks that emerged from the comic books and videogames of the 1980s, The Weird History of USAmerican Fascism fills a critical lacuna in cultural theory while correcting recent oversights in the academic analysis of contemporary fascism, providing an essential guide to the past, present, and future of the bizarre world of USAmerican politics.
    [Show full text]
  • We the Media by Dan Gillmor (PDF)
    The contents of this document were downloaded from http://www.oreilly.com/catalog/wemedia/book/ I have combined the individual HTML and PDF files into this one large file. No changes have been made. -- John Goerzen 8/6/2004 08/06/04 http://www.oreilly.com/catalog/wemedia/copyright.html #1 ¡£¢¥¤¦¡¨§©¡ ¦!#"%$'&(%) *,+-/.%0¨120 ¦3 $054768¦5/.%0¨120 ¦3 $0 9;:=<?>7@BA CEDEDGFIHKJ LM7NPOQ'RTS7UWVYX[Z]\^\`_ba%cKdfe REgEgEhiM7QkjmlngEg#Q'RTS7UWVpoqQsrtourKQvwr^x?j Q'REdWVzr^x{REd|V}U~r d^RVzr^xnVzcVzrto M¥lnhIrKQ'R#c?j y gERTo7U~r^x O2%rKREgEgOr^xKRcTd~`jGP\^\^e Qsc~vwrKd`otVzrKREdRTS7U;¦c~O2M7Q}V}U]r ctotVpM7N`M7gz/L2l ^`_7Znj y^ %rKREgEgOr^xKRc M^M7oqhIc~O r{N Qs;U~ctour^xBzM7Q~r^x #cV}RTM7d~cKgz o7REd~rto^o?8M7Q`oucKgrtoqN^QM7hiMtV}RTM7d~cKg our?j ^ d^gEREd~r r^xKRV}RTM7d`ocKQsr cKgTo^Mc~vwcKREgc grBzM7Q^hiM^otV#V}RV}grtoq ouc~(cKQ'R(j M7QsrKREgEgO¥j¥M7h¢¡kj¥£PM7Q^hiM7Qsr{REdPzM7Q'hIcV}RTM7d]¤¥M7dWVzc^YV M Q~¥M7Q'N`M7QscVzr`¥sREd`otV}RV V}RTM7d~cKgoucKgrtox^rKN~cKQ}V}hIrKdWV§¦/ s¨u\^\]¡^t¨t©ª^^«t¨fM7Q~¥M7Q'N`M7QscVzr]¬­M7QsrKREgEgO¥j¥M7hj ¦mlngEgrKd2M7QsrKd ®,¯~°(±G²³ ¦YcKQO¸Qsc^x~O ´³ª²u¯uµt¶#±°z²·®,¯~°(±G²³ ¹ ¦¥¿h¢hIcLM7g O ²7º/»~³]¼ »½¥°E¾^·K»~³ ¦YrKgcKd^RrBÁcKd`S Às·K±E»~³'°z²³]¼ »½¥°E¾^·K»~³ ¦ ´³'°E·K±°E·^¾Â°p½±G²³sà gOÅZ]\^\`_¦¥£REQotV~¿xKRV}RTM7dKj ÄP U~r%rKREgEgOgTM^S^MqRToc{QsrtS7RTotVzrKQsr^x=V}Qsc^x^rKhIcKQ'MP%rKREgEgOr^xKRcTd~`jÁr=V}U~rqr^xKRc cKd~x{QsrKgcVzr^x=V}Qsc^x^r Æ xKQsrto^ocKQsr=V}Qsc^x^rKhIcKQ'o MP%rKREgEgOr^xKRcTd~`j cKdPOÅMÇV}U~r x^rto7RTS7d~cV}RTM7d`o our^x OhIcKd (c^YV QsrKQocKd~xfourKgEgrKQofVpMxKRTotV}REd`S
    [Show full text]
  • User Generated Content, Social Media, and Advertising — an Overview April 2008
    IAB Platform Status Report: User Generated Content, Social Media, and Advertising — An Overview April 2008 A series of papers that will lead the way to a vigorous and healthy industry with commonly adopted terminology, practices and standards. Platform Status Report: USER GENERATED CONTENT, SOCIAL MEDIA, AND ADVERTISING Contents Executive Summary 1 What is User Generated Content? 1 History 1 Today Review Sites 1 Blogs 4 Wikis 5 UGC & Online Advertising Networks 5 What is Social Media? 5 Social Media Platforms 5 Social Networks 6 Content Sharing 6 Widgets 7 Impact on the Advertising Landscape 7 Comparisons to other forms of advertising 7 Trends in UGC Advertising 8 “Overlay” Video Ads 8 Conversation Targeting 8 Custom Communities 8 Dedicated Channels 9 Brand Profi le Page 9 Branding Wrappers 10 Widgets 10 Challenges and Opportunities 12 Empowering Marketers to Shape the Discussion 12 Identifying Rewards versus Risks 12 Experimentation 13 Who is the IAB UGC & Social Media Committee? 14 Member Companies 14 Member Companies, continued 15 Platform Status Report: USER GENERATED CONTENT, SOCIAL MEDIA, AND ADVERTISING Executive Summary In 2008, if you’re not on a social networking site, you’re not on the Internet. It’s as true for advertisers as it is for consumers. Social networking is the ultimate manifestation of user generated content, and as such, holds more potential for growth than any other form of content on the Web today. User Generated Content (UGC) and Social Networks are transforming the media ecosystem. Gone are the days when power rested in the hands of a few content creators and media distributors.
    [Show full text]
  • Ve Been Knocking Men Like You Into the Dust': Game of Thro
    ‘All my life men like you have sneered at me. And all my life I’ve been knocking men like you into the dust’: Game of Thrones in Online Feminist Communities Amanda DiGioia University College London The blogosphere is awash with women and men writing about topics of great concern to feminists (Miller, 2014: 73). Additionally, feminist scholars have debated the merits and demerits of computer-networking technologies and feminist activism (Schulte, 2011: 728), as well as issues relating to representation and popular culture. As part of that latter set of conversations, web publishing platform Kinja, part of online giant Gawker Media and launched in April of 2004, has featured a variety of discussions related to A Song of Ice and Fire and/or Game of Thrones,. This profile focuses on two main aspects of Kinja and Game of Thrones: First, how Kinja handles and shapes feminist fan conversations about Game of Thrones; and secondly, what benefits Kinja has when it comes to fan interactions within spaces that are explicitly labelled as feminist. This profile will focus on GroupThink, The Powder Room, and The Observation Deck, blogs that are not affiliated with Gawker media, but are instead run by members of the Kinja community. The authors of these blogs are not paid Gawker employees; they are commentators given permission to make blog posts on Kinja. Many commentators have pennames, therefore they will be quoted using these pseudonyms. I interviewed three Kinja users: Lyra, Sadie, and Artie, as well as one Kinja feminist sub-blog moderator, Zap. Lyra is a woman living in Canada who believes that villains are always the more interesting literary characters.
    [Show full text]
  • Audiomotive: Your Car, Your Music - Gizmodo Page 1 of 3
    Audiomotive: Your Car, Your Music - Gizmodo Page 1 of 3 Login: Pass: Login Register Gizmodo, the gadget guide. So much in love with shiny new toys, it's unnatural. POPULAR FRONT ALL Search TOPIC: ALL TOP « || next » [email protected] Ever wonder about the best way to get that all the digital music into your car? Wonder no more. Guest Editor Lionel Felix takes an in-depth look at some of the car audio options out there, from plug-and-play iPod adapters to built-in automobile hard drives. LIONEL FELIX -- With automakers asleep at the wheel, the aftermarket is taking an inside line. Car manufacturers are not yet caught up to "Internet Time", leaving digital music technology out of design plans. XM radio and DVD bundles are good baby steps but cars are a platform that has always demanded aftermarket exploitation. Aftermarket manufacturers are racing to sell some great and some not-so-great products to fill the void left by automakers, who are still having great difficulty getting out of their own way, unable to respond to the demands of customers. BMW and Audi are the only manufacturers responding to the clamor from the washed masses. The unwashed, myself included, are still dying to get all of that (legally, wink wink) downloaded music and movies into our g-rides. Still, its not quite enough. We have a taste for WiFi, Bluetooth, navigation, DivX, GPRS systems that won't stink up the parking lot with stale technology in 2 years. Cars will need to be upgradeable and standards established in order to provide customers with new technologies for their cars' 100-200K mile lifecycle.
    [Show full text]