Google’s Chrome changes make life harder for ad blockers

0
[ad_1]

Despite protests, Google is rolling out changes in the Chrome browser that make it harder for ad blockers to do their job.

Starting last Monday, June 3, 2024, Chrome Beta, Dev, and Canary channels will see the effects of the implementation of the new extension platform Manifest V3. The gradual disabling of V2 extensions will later follow for all Chrome users.

For those not familiar with the terms, Manifest V2 and V3 are the “rules” that browser extension developers are required to follow if they want their extensions to get accepted into the Google Play Store.

Manifest V2 is the old model. The Chrome Web Store no longer accepts Manifest V2 extensions, but browsers can still use them. For now. Google explained that the goal of the new extension platform:

“Is to protect existing functionality while improving the security, privacy, performance and trustworthiness of the extension ecosystem as a whole.”

That’s commendable, because it stops criminals from hiding the malicious intentions of their extensions when they submit them for the Google Play Store.

However, the part of the transition that hinders ad blockers lies in the fact that extensions will now have limitations on how many rules they include. Google has made some compromises after initial objections, but the limitations are still present and have a large effect on ad blockers since they historically rely on a large number of rules. That’s because, generally speaking, each blocked domain or subdomain is one rule, and cybercriminals set up new domains by the dozen.

Google has tried to address developers’ concerns by adding support for user scripts and increasing the number of rulesets for the API used by ad blocking extensions. But this might not be enough.

Users can temporarily re-enable their Manifest V2 extensions, but this option will eventually disappear.

One of the affected ad blockers is the one incorporated in our own Malwarebytes Browser Guard.

We talked to one of the developers about the plans for Browser Guard and how it will deal with the Manifest V3 rules. They told us that the new Browser Guard, which is already available in beta, will use a mix of static and dynamic rules to protect our users.

Static rules are rules that are contained in the ruleset files which can be seen as block lists. These files are declared in the manifest file.

Dynamic rules are rules that can be added and removed at runtime. Chrome allows up to 30k dynamic rules. Browser Guard uses dynamic rules for two purposes:

  • Session rules are dynamic rules that can be added and removed at runtime, but they are session-scoped and are cleared when the browser shuts down and when a new version of the browser is installed.
  • And dynamic rules can be used to store allow lists, user blocked content, and general rules that block more than one domain. Take, for example, the IP address of a server that is known to host nothing but phishing sites.

And, to deal with urgent situations, we can use ruleset overrides, which are a mechanism by which we can override the static rules shipped with Browser Guard without requiring our users to add exclusions.

If you want to help Malwarebytes get ready for the transition, you can test the beta version of Browser Guard for Manifest V3.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.


[ad_2]
Source link

Google describes how its achieved plastic-free Pixel packaging

0
[ad_1]

In recent years, smartphone manufacturers have been taking measures to try to reduce their environmental impact. Some have been unpopular or questionable, such as removing the charger from the retail box. Google has taken this further by also opting for plastic-free packaging for its Pixel devices.

Now, Google has published a packaging design guide. The company describes what it has been doing to achieve plastic-free packaging on its Pixel devices. The company says the guide is a “resource for others aiming to reduce their reliance on mixed material formats and adopt fiber-based solutions.”

Pixel 8 series has plastic-free packaging; all Google products will have it by 2025

The guide indicates the packaging components that were replaced. This is all in favor of reducing its carbon footprint. It’s noteworthy that Google achieved this plastic-free packaging starting with the Pixel 8 series. The company hopes to apply these principles to the packaging of all its products by 2025. With this, it wants to facilitate recycling and reusability.

One of the challenges was finding viable alternatives for all the packaging components. After all, it is necessary that the packaging continues to keep the products safe during transportation. As Google indicates, “replacing damaged products carries a significant environmental impact.”

The list of replaced components that made recycling difficult includes up to seven items. Google replaced them in different ways, such as by applying alternative coating solutions, shrink wrap removal strategies, closure labels, paper tapes, molded fiber hang tabs, protective product wraps, and molded fiber trays. So, Google turned heavily to fiber-based materials for this. There is a lot of paper and cardboard among the new used materials.

Currently, Google products have three types of packaging. There is a “Telescoping box” that reveals the product immediately after opening it. This has a “simple opening and closing mechanism” to make the task easier. Then there is the “Roll end lock front box” whose front panel is “interlocking tabs for closure.” The latter seeks to offer a higher level of protection. Lastly, there’s the “Tuck top box” for accessories and small gadgets.


[ad_2]
Source link

Apple could add Gemini to iOS 18

0
[ad_1]

Apple just held its latest WWDC event, and we’re all still reeling from the announcements. Everything from the calculator app on the iPad to iOS 18’s take on Material You to AI (Apple Intelligence); the company introduced some great stuff. After the keynote, however, we got some other news. According to a new report, Apple could implement Gemini into iOS 18.

Some of the more notable announcements we got during WWDC involved the latest version of iOS. This is iOS 18, and it comes chock-full of AI goodies. The artificial intelligence is baked deeply into the software, and it goes far beyond what we’re getting from the likes of Galaxy AI. We’re even seeing better integration than Gemini on Android. So, it looks like Google has some catching up to do.

Apple could implement Gemini into iOS 18

A few weeks before WWDC, we were following rumors that Apple was looking to partner with either OpenAI or Google to use their models. When the company announced Apple Intelligence, it also mentioned OpenAI. When the system needs to access larger language models in the cloud, it will contact GPT-4o. So, it’s clear that Apple chose to go with OpenAI.

However, the story doesn’t end there. Craig Federighi, the company’s senior vice president of software engineering, mentioned that Apple may still be open to bringing in Google’s models. “We want to enable users ultimately to choose the models they want, maybe Google Gemini in the future,” he told reporters after the keynote.

Right now, there are a ton of models for the company to choose from, but GPT-4o and Gemini seem to be some of the best ones. This is despite the fact that Gemini has been dropping the ball in several areas. In any case, it’s still nice that the company wants to give people the opportunity to choose. Having more choices is always better. At this point, this is still early information, so we’ll have to wait for more details over time.


[ad_2]
Source link

Remcos RAT Distributed As UUEncoding (UUE) File To Steal Logins

0
[ad_1]

Researchers identified a campaign distributing Remcos RAT, a Remote Access Trojan, where the attack uses phishing emails disguised as legitimate business communication, such as import/export or quotations. 

The emails contain a UUEncoded (UUE) file compressed with Power Archiver, which likely contains the Remcos RAT downloader, which once executed would allow attackers remote access to the victim’s machine. 

A phishing email

An attacker is distributing a malicious VBS script hidden within an attachment. The script is encoded using Unix-to-Unix Encoding (UUE), a method for converting binary data into readable text format.

With ANYRUN You can Analyze any URL, Files & Email for Malicious Activity : Start your Analysis

This disguises the script from detection systems. 

The UUE-encoded attachment has a header, an encoded data section, and an end marker.

Decoding the attachment reveals an obfuscated VBS script, further complicating the analysis. 

An obfuscated vbs script

VBScript acts as a downloader, fetching a malicious PowerShell script (Talehmmedes.txt) and saving it in the victim’s temporary directory, which in turn downloads Haartoppens.Eft, another malicious script, from a remote server and stores it in the user’s AppData folder. 

 Part of the Base64-decoded Talehmmedes.txt

Haartoppens.Eft is obfuscated, making it difficult to analyze its functionality.

However, it can be identified as another PowerShell script and its primary function is to inject shellcode into the wab.exe process, a legitimate Windows process associated with address book contacts. 

The shellcode establishes persistence by modifying the registry, ensuring the attacker maintains access to the compromised system even after a reboot. 

It retrieves further malicious data (mtzDpHLetMLypaaA173.bin) from another remote server, which is likely another PowerShell script or a component used by the malware for malicious purposes. 

Ultimately, this entire chain of events leads to the execution of the Remcos Remote Access Trojan (RAT), granting the attacker unauthorized control over the victim’s machine.

Adding a registry – 1

Remcos RAT, a sophisticated remote access trojan, extracts system information via hxxp://geoplugin[.]net/json.gp, likely for geolocation purposes. 

The malware then logs keystrokes and stores them as mifvghs.dat within the user’s application data directory (AppData), which is then exfiltrated to the attacker’s command and control (C&C) server, granting the attacker comprehensive information about the victim’s machine and their keystrokes. 

Remcos RAT settings

AhnLab SEcurity intelligence Center (ASEC) warns users about malicious files detected by AhnLab V3 anti-malware.

The files are disguised as invoice documents (Invoice_order_new.uue and Invoice_order_new.vbs) and spread through emails. 

They are classified as Downloader/VBS.Agent (downloading additional malware) and Data/BIN.Encoded (containing encoded malicious data).  

The IOCs (Indicators of Compromise) – unique hashes associated with the files – are provided to identify and block them and to prevent infection; users are advised to avoid emails from unknown senders, disable macros in attachments, and update anti-malware signatures.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo 


[ad_2]
Source link

When things go wrong: A digital sharing warning for couples

0
[ad_1]

“When things go wrong” is a troubling prospect for most couples to face, but the internet—and the way that romantic partners engage both with and across it—could require that this worst-case scenario become more of a best practice.

In new research that Malwarebytes will release this month, romantic partners revealed that the degree to which they share passwords, locations, and devices with one another can invite mild annoyances—like having an ex mooch off a shared Netflix account—serious invasions of privacy—like being spied on through a smart doorbell—and even stalking and abuse.

Importantly, this isn’t just about jilted exes. This is also about people in active, committed relationships who have been pressured or forced into digital sharing beyond their limit.

The proof is in the data.

When Malwarebytes surveyed 500 people in committed relationships, 30% said they regretted sharing location tracking with their partner, 27% worried about their partners tracking them through location-based apps and services, and 23% worried that their current partner had accessed their accounts without their permission.

Plenty of healthy, happy relationships share digital access through trust and consent. For those couples, mapping out how to digitally separate and insulate their accounts from one another “when things go wrong” could seem misguided.

But for the many spouses, girlfriends, boyfriends, and partners who do not fully trust their significant other—or who are still figuring out how much to trust someone new—this exercise should serve as an act of security.

Here’s what people can think about when working through just how much of their digital lives to share.

Inconvenient, annoying, and just plain bothersome

A great deal of digital sharing within couples occurs on streaming platforms. One partner has Netflix, the other has Hulu, the two share Disney+, and years down the line, the couple can’t quite tell who is in charge of Apple Music and who is supposed to cancel the one-week free trial to Peacock.

This logistical nightmare, already difficult for people who are not in a committed relationship, is further complicated after a breakup (or during the relationship if one partner is particularly sensitive about their weekly algorithmic recommendations from Spotify).

If an ex maintains access to your streaming accounts even after a breakup, there’s little chance for abuse, but the situation can be aggravating. Maybe you don’t want your ex to know that you’re watching corny rom-coms, or that you’re absolutely going through it on your seventh replay of Spotify’s “Angry Breakup Mix.” These are valid annoyances that will require a password reset to boot your ex out of the shared account.

But there’s one type of shared account that should raise more caution than those listed above: A shared online shopping account, like Amazon.

With access to a shared online shopping account, a spiteful ex could purchase goods using your saved credit card. They could also keep updates on your location should you ever move and change addresses in the app. This isn’t the same threat as an ex having your real-time location, but for some individuals—particularly survivors of domestic abuse who have escaped their partner—any leak of a new address presents a major risk.

Non-consensual tracking, monitoring, and spying

When couples move into the same home, it can make sense to start sharing a variety of location-based apps.

Looking for a vacation rental online for your next getaway? You’re (hopefully) lodging together. Ordering delivery because nobody wants to make dinner? That order is being sent to the same shared address. Even some credit cards offer specific bonuses on services like Lyft, incentivizing some couples to rely more heavily on one account to score extra credits.

While sharing access between these types of accounts can increase efficiency, it’s important to know—and this may sound obvious—that many of these same shared location-based apps can reveal locations to a romantic partner, even after a breakup.

Your vacation could be revealed to an ex who is abusing their previously shared login privileges into services like Airbnb or Vrbo, or by someone peering into the trip history of a shared Uber account that discloses that a car was recently taken to the airport. Food delivery apps, similarly, can reveal new addresses after a move—a particular risk for survivors of domestic abuse who are trying to escape their physical situation.

In fact, any account that tracks and provides access to location—including Google’s own “Timeline” feature and fitness tracking devices made by Strava—could, in the wrong hands, become a security risk for stalking and abuse.

The vulnerabilities extend farther.

With the popularity of Internet of Things devices like smart doorbells and baby monitors, some partners may want to consider how safe they are from spying in their own homes. Plenty of user posts on a variety of community forums claim that exes and former spouses weaponized video-equipped doorbells and baby monitors to spy on a partner.

These scenarios are frightening, but they are part of a larger question about whether you should share your location with your partner. With the proper care and discussion, your location-sharing will be consensual, respected, and convenient for all.

Stalking and abuse

When discussing the risks around digital sharing between couples, it’s important to clarify that trustworthy partners do not become abusive simply because of their access to technology. A shared food delivery app doesn’t guarantee that a partner will be spied on. A baby monitor with a live video stream is sometimes just that—a baby monitor.

But many of the stories shared here expose the dangers that lie within arm’s reach for abusive partners. The technology alone cannot be blamed for the abuse. Instead, the technology must be scrutinized simply because of its ubiquitous use in today’s world.

The most serious concerns regarding digital access are the potential for stalking and abuse.

For partners that share devices and device passcodes, the notorious threat of stalkerware makes it easy for an abusive partner to pry into a person’s photos, videos, phone calls, text messages, locations, and more. Stalkerware can be installed on a person’s device in a matter of minutes—a low barrier of entry for couples that live with one another and who share each other’s device passcodes.

For partners who share a vehicle, a recent problem has emerged. In December, The New York Times reported on the story of a woman who—despite obtaining a restraining order against her ex-husband—could not turn off her shared vehicle’s location tracking. Because the car was in her husband’s name, he was able to reportedly continue tracking and harassing her.

Even shared smart devices have become a threat. According to reporting from The New York Times in 2018, survivors of domestic abuse began calling support lines with a bevvy of new concerns within their homes:

“One woman had turned on her air-conditioner, but said it then switched off without her touching it. Another said the code numbers of the digital lock at her front door changed every day and she could not figure out why. Still another told an abuse help line that she kept hearing the doorbell ring, but no one was there.”

The survivors’ stories all pointed to the abuse of shared smart devices.

Whereas the solutions to many of the inconveniences and annoyances that can come with shared digital access are simple—a reset password, a removal of a shared account—the “solutions” for technology-enabled abuse are far more complex. These are problems that cannot be solely addressed with advice and good cybersecurity hygiene.

If you are personally experiencing this type of harassment, you can contact the National Network to End Domestic Violence on their hotline at 1-800-799-SAFE.

Making sure things go right

Sharing your life with your partner should be a function of trust, and for many couples, it is. But, in the same way that it is impossible for a cybersecurity company to ignore even one ransomware attack, it’s also improper for this cybersecurity and privacy company to ignore the reality facing many couples today.

There are new rules and standards for digital access within relationships. With the right information and the right guidance, hopefully more people will feel empowered to make the best decisions for themselves.


We don’t just report on threats – we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your—and your family’s—personal information by using identity protection.


[ad_2]
Source link

camera, display, SoC & more

0
[ad_1]

A well-known Chinese tipster, Digital Chat Station, just shared a bunch of information about Xiaomi’s upcoming flagship. He shared the Xiaomi 15 details, including the camera, display, SoC, and more.

The Xiaomi 15 details were just shared by a well-known tipster

This information was shared via Weibo, a Chinese social media network. Do note that he seems to be talking about the regular Xiaomi 15 here, not the ‘Pro’ model. The device is expected to have a 6.36-inch display, like its predecessor, though the tipster did not mention the size. A 1.5K LTPO display is mentioned, however.

The Snapdragon 8 Gen 4 SoC will fuel the phone, as expected. The tipster also mentioned that 16GB of RAM will be included, along with 1TB of storage. That will likely be the top-end model.

A 50-megapixel main camera from OmniVision is tipped. That will be a 1/1.3-inch camera sensor, by the way. A 50-megapixel ultrawide camera will also be a part of the package, as will a 3.X telephoto macro camera.

The phone will launch in several variants

The tipster also mentioned that the phone will arrive in glass and eco-leather variants. It could be available in a glass-only variant globally, though.

Some other details were mentioned by the tipster. He said that the device will include an ultrasonic fingerprint scanner which will sit under the display. Stereo speakers will also be a part of the picture. The phone’s earpiece will double as a secondary speaker. A good motor for haptic feedback was also mentioned.

Now, the Xiaomi 14 series arrived in October last year. Well, most of it, anyway. The Xiaomi 14 and Xiaomi 14 Pro were announced, while the ‘Ultra’ model arrived later on.

The Xiaomi 14 Pro did not launch globally, only the Xiaomi 14 did, along with the Xiaomi 14 Ultra, of course. The same could happen next year too, actually. The Xiaomi 15 and Xiaomi 15 Pro could once again launch in October, though, we’ll see.


[ad_2]
Source link

The ultimate SEO guide for small businesses in 2024: Boost your online presence

0
[ad_1]

Small businesses more than anyone need to be online if they hope to stay competitive in a digital world – they need good search engine optimisation (SEO) practices, like yesterday. In fact, since most customers today are using search engines like Google to discover and buy things on the web, a powerful SEO or web advertising strategy is regularly significant. SEO boosts rankings, keywords, organic traffic, and user experience for better online visibility. So, yes, small businesses need SEO for improving page-rank, organic traffic, and providing a unique user experience.

Year 2024: SEO is on the upward climb with novel trends and technologies. These notable trends include the surge of artificial intelligence (AI) and machine learning in search algorithms, amplified focus on user experience (UX) and core web vitals, the increasing importance of mobile-first indexing, and the incorporation of voice search optimization. If you used to focus on keywords, it is also time you have to focus more on video content, how to solve the user’s problem, and also on structured data.

SEO Basics – Knowing SEO is Search Engine Optimization is optimising a website to get better rankings in SERPs. And a lot of focus is given on keyword research, content optimization, technical SEO, and link building to drive organic search engine traffic.

How Search Engines Work

Google and other search engines use an algorithmic process to crawl the vast information on the web to index key indicators of quality and relevance. Crawlers – These are bots which reads sites for confine, association and metadata. That raw data is indexed, and an algorithm factors in hundreds of other elements, like keyword usage, user experience, and backlinks, to determine what pages rank where on SERPs.

Key SEO Terminology

Keywords: The words or phrases users type in search engines to find related information.

Backlinks: A link from another website to your own, indicating to Google that your site is about a topic (keyword) or two, and is trustworthy.

SERP: The page displayed by search engines, including text content, paid results, ads, images, and more, in response to a query.

Meta Tags: HTML tags within the content that communicate details regarding your webpage, such as title tags and meta descriptions.

Bounce Rate: % of Visitors Who Enter Your Website and Leave After Only Viewing One Page.

Organic Traffic: This is a visitor who will come to your landscape without any payment.

Keyword Research

Keywords are the cornerstone of SEO because they give search engines insights into what the content on your website is about and then potentially match it up with query intent. Keyword research helps you understand popular search terms and phrases that your target audience uses, so that you can optimize your content and maximize the likelihood of your content appearing high in search engine results pages.

Tools for Keyword Research

1. Google Keyword Planner

Google Keyword Planner: It is a free tool that helps to show keyword ideas and traffic estimations. It aids businesses with certain keywords and establishes the number of search volumes and competition too.

2. SEMrush

FULL SEARCH ENGINE OPTIMIZATION AND AUDIT TOOL BOX BY SEMrush- SEMrush is a complete SEO platform with various tools for work like keyword research, competitor research, etc. The tool also gives a lot of keyword data, such as search volume, keyword difficulty, and other related keywords.

3. Ahrefs

Ahrefs is an integrated marketing analysis toolset having features like URL Rating, Site Explorer, and Keyword Explorer. Their basic keyword tool gives you lots of keyword data, search volume, K.D., CTR.

Long-tail vs. Short-tail Keywords

Short-tail Keywords: This type of keywords are broad keywords with a single term or 2 terms (e.g., Shoes). They have high search volume but have very high competition.

Long-tail Keywords: Words that are more targeted and often three words or longer (e.g., best running shoes for women). While these are less competitive, they are also less searched, so may not generate lots of traffic, but it is higher quality.

Analyzing Keyword Competition

To assess keyword competition, you need to consider how hard it would be to rank for certain keywords. SEMrush and Ahrefs, both tools give keyword difficulty scores showing how competitive a keyword is. Targeting low to medium competition keywords can help you to rank higher and get more organic traffic.

On-Page SEO

Optimizing Title Tags and Meta Descriptions

Title and meta description are important to cover in on-page SEO work. A unique, keyword-focused, and brief title tag for the landing page. The description under a snippet that shows up in SERPs is the meta description; its purpose is to highlight who we are and what we do, so it should encourage people to click. These two are a must for all pages.

Content Optimization

1. Quality and Relevance

Good, quality, most directly-related content is remarkable for SEO. Content needs to be useful, informative, fresh, to the point, readable, give them what they are looking for, and needs to be backed by research. Do not repeat – quality, targeted copywriting aimed for information-filled, natural, original content.

2. Keyword Density and Placement

Incorporate keywords into your content in a natural way, in your headings, subheadings, and in the first 100 words. Do not over-optimize a keyword density of 1-2%.

3. Use of Headings (H1, H2, H3)

Help organize your content and also help search engines better understand your article. Use H1 for your main title, H2 for subheadings, and further subdivisions as H3. Headings should include keywords where appropriate.

Image Optimization

1. Alt Text

Alt text for image content allows search engines to index them. ALT text on the other hand should be simple, descriptive, and include a few relevant keywords.

2. File Names and Sizes

These descriptive file names will load small size images quickly on pages. Optimize images to improve performance while retaining quality.

URL Structure

Clean URLs separate words with hyphens, make your URLs short, and include keywords relevant to certain pages. Don’t include special characters and strip unnecessary parameters.

E. Internal Linking Strategies

Internal links work by linking different pages reasonably accomplished in your site, thus providing search engines with an understanding of hierarchy and structure. Link to the relevant pages with descriptive anchor text to make the user experience better and your SEO better.

Technical SEO

Website Speed and Performance

Website speed is very important in SEO. Websites that take forever to load can alienate visitors and lower your rankings. Identify how your Shopify website is performing and fix it using tools like Google PageSpeed Insights. So, speed up images of your site and use browser cache or minimize JS and CSS.

Mobile-Friendliness

Since most searches occur on mobile devices, you need a responsive website. Responsive – Make your site react to any screen size. In the SEO space, we have another tool like: Google Mobile-Friendly Test – to see if your website is smartphone ready. SSL (Secure Sockets Layer) SSL certificates makes the connection https between the user’s browser and your website, and data encryption. SSL certificate is also important factor in the ranking of Google, and it allow the user to ensure trust. Your site must be on HTTPS, not HTTP.

XML Sitemaps and Robots.txt

It makes search engine bots quickly index your site. Get Google and more search engines to see your XML sitemap. Use the robots. Add a txt file to assist the search engines on what to crawl and what not to. Schema. org Structured Data Markup By using structured data markup you are able to wrap your content in a way that will allow search engines to have a better understanding about what your page is and enhance the visibility of your organic results in SERPs. Use Schema. on org tags to enable search engines to understand that your page contains such things as product and review info, ratings, event info, etc.

Local SEO

Importance of Local SEO for Small Businesses

Local SEO is especially important for Small Business SEO because there are many businesses that only serve certain local geographic areas. Localizing your strategy means that your business will rank higher in local search results, which can help drive customers to your brick-and-mortar location.

Google My Business Optimization

Claim Your Google My Business Listing & Optimize. Keep your business details current. This means your address, phone number, hours of operation, and URL. Upload photos, reply to reviews, post GMB!

Local Citations and Directories

Have your business listed in local directories and citation sites similar to Yelp, Yellow Pages, and industry-specific directories. Consistent NAP (Name, Address, Phone number) information makes a huge change in local SEO.

Online Reviews and Ratings

Customer critiques would be an excellent choice, especially on sites like Google, Yelp, and in industry-specific sites. Reply immediately and professionally to reviews for developing trust with clients and for improving your online reputation.

Local Content Creation

Design content that is location specific. This may involve writing blog posts about what is going on in town, the news, and the type of community events that the business is involved in. Look for local content to share to connect with your audience and improve local search rankings.

Off-Page SEO

Backlink Building

High-quality Backlinks from an authority site are worth more than dozens of low-quality links. Get very serious about building relationships with high-powered sites in your industry.

Social Media Integration

Helps in increasing website traffic and branding being the benefit. For a website, using social media boosts SEO and more. Post your content on social media and interact with your viewers on those platforms too, to help take it that extra step further and get people to want to share your content and boost your online reputation.

Content Strategy

Content Calendar and Planning

A content calendar is a way for you to arrange your content creation. It helps you to keep a regular posting schedule and aligns your efforts according to your content goals. Create content based on big dates, events, or seasonal trends that your audience will be interested in.

Blogging Best Practices

This is why blogging is so great for traffic generation and SEO. Use methods like wrenching compelling headlines, streamlining your keywords organically, as well as interspersing both electronic and exterior backlinks.

Analytics and Monitoring

Setting Up Google Analytics

Leverage this data to find areas where you can improve and gauge your SEO effectiveness.

Key Metrics to Track

1. Organic Traffic

Organic traffic includes the visitors who reach your site by clicking search results that require no payment. Organic Traffic – This helps to measure if your SEO efforts are working or not.

2. Bounce Rate

Bounce rates are the indicators of user experience and relevant content.

SEO Audit Tools

1. Screaming Frog

Screaming Frog is a web crawler tool to discover technical SEO problems. It shows precise information about broken links, duplicate content, and such on-page SEO factors.

2. Moz Pro

Moz Pro comes with various SEO tools, such as site audits, keyword research, backlink analysis, etc.

Staying Updated with SEO Changes

Following Industry Blogs and News

SEO is always evolving, so staying updated with changes and current trends is important. Additional tip: read industry blogs (e.g., Moz, Search Engine Land, Google Webmaster Blog) regularly.

Participating in SEO Communities

Part of your SEO work as a professional also extends to the community. Reddit SEO Community, Moz Q&A, and SEO Facebook Groups are certainly good places to learn and network.

Attending SEO Conferences and Webinars

SEO conferences and webinars are effective at learning from the experts in the industry and keeping up with new trends. SMX, MozCon, Pubcon: All deliver awesome information and networking opportunities. SEO Is A Process Of Reinvention SEO is not a set-and-forget activity. Experiment and don’t be scared to pivot in response to data and feedback. SEO: Learn Faster Than Your Competitors By Investing In Knowledge.

To Wrap Up

From SEO Basics, Keyword Research, On-Page search engine optimization & Technical SEO, Link Building, Local SEO, Content Strategy, Analytics, Reporting & Monitoring – we spoke greater about key SEO problems for small businesses in 2024. You can improve your business presence and grow online business as per the following SEO Strategies.   Follow the suggestions and techniques in this guide to get started and continue to refine your efforts for long-term success. SEO is not a fast or easy process; you need to be dedicated and continually learn. Keep up with new industry techniques, try new strategies, and aim for high-performance audiences. This can help maintain a reputable online profile for your small business.


[ad_2]
Source link

23andMe data breach under joint investigation in two countries

0
[ad_1]

The British and Canadian privacy authorities have announced they will undertake a joint investigation into the data breach at global genetic testing company 23andMe that was discovered in October 2023.

On Friday October 6, 2023, 23andMe confirmed via a somewhat opaque blog post that cybercriminals had “obtained information from certain accounts, including information about users’ DNA Relatives profiles.”

Later, an investigation by 23andMe showed that an attacker was able to directly access the accounts of roughly 0.1% of 23andMe’s users, which is about 14,000 of its 14 million customers. The attacker accessed the accounts using credential stuffing which is where someone tries existing username and password combinations to see if they can log in to a service. These combinations are usually stolen from another breach and then put up for sale on the dark web. Because people often reuse passwords across accounts, cybercriminals buy those combinations and then use them to login on other services and platforms.

For a subset of these accounts, the stolen data contained health-related information based on the user’s genetics.

The finding that most data was accessed through credential stuffing led to 23andMe sending a letter to legal representatives of victims blaming the victims themselves.

Privacy Commissioner of Canada Philippe Dufresne and UK Information Commissioner John Edwards say they will investigate the 23andMe breach jointly, leveraging the combined resources and expertise of their two offices.

The privacy watchdogs are going to investigate:

  • the scope of information that was exposed by the breach and potential harms to affected individuals;
  • whether 23andMe had adequate safeguards to protect the highly sensitive information within its control; and
  • whether the company provided adequate notification about the breach to the two regulators and affected individuals as required under Canadian and UK privacy and data protection laws.               

The joint investigation will be conducted in accordance with the Memorandum of Understanding between the ICO and OPC.

Scan for your exposed personal data

You can check what personal information of yours has been exposed online with our Digital Footprint portal. Just enter your email address (it’s best to submit the one you most frequently use) to our free Digital Footprint scan and we’ll give you a report. If your data was part of the 23andMe breach, we’ll let you know.


We don’t just report on threats – we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your—and your family’s—personal information by using identity protection.


[ad_2]
Source link

Galaxy Z Fold 6 to introduce sketch-to-drawing AI feature

0
[ad_1]

Samsung will add more AI features to its Galaxy AI suite next month. The features will be part of One UI 6.1.1 for the Galaxy Z Fold 6 and Galaxy Z Flip 6, though the company will roll out most of them to older models. While it hasn’t named anything yet, a reliable tipster has now revealed one of the new features in the pipeline. The new Fold can develop a rough sketch into a proper drawing with the help of text prompts.

Galaxy Z Fold 6 will introduce new AI features

Samsung’s One UI 6.1 for the Galaxy S24 series set a new trend in the smartphone industry. Based on Android 14, the new One UI version introduced Galaxy AI, a suite of on-device and cloud-based AI features for Galaxy devices. The company baked AI features into the camera, image editor, notes, messages, calls, and various other apps and services. It has since rolled out Galaxy AI to many older flagships, including foldables.

In the meantime, AI features have quickly become a norm in smartphones. Apple recently jumped on the bandwagon, announcing Apple Intelligence at WWDC 2024. The iPhone maker demoed many new features at the ongoing developers’ conference, including an impressive tool called Image Wand. It uses text prompts, sketches, or both to create a suitable image for your work presentation or architectural project.

Samsung is seemingly working on a similar tool, and it may debut before Apple rolls out Image Wand to iPads (scheduled to come with iPadOS 18 later this year). Noted tipster Ice Universe, who uncovered this upcoming Galaxy AI tool, is confident that Samsung will beat Apple to the party. The source said it will be available on the Galaxy Z Fold 6, but the new AI feature should make its way into more Galaxy flagships with One UI 6.1.1.

This feature may not reach all older flagships

Not all devices getting the new One UI update will get this feature though. Samsung will probably limit it to recent Fold-series foldables, flagship tablets, and Galaxy S Ultra models that support S Pen input. One UI 6.1.1 may not reach mid-range devices. even if it does, don’t expect any AI features to be part of the update. We should get a clearer picture closer to the Galaxy Unpacked event next month. The upcoming Unpacked will reportedly take place on July 10 in Paris, France. It will also bring new smartwatches, TWS earbuds, and the Galaxy Ring.


[ad_2]
Source link

YouTube starts testing AI summarizer on Shorts (mobile only)

0
[ad_1]

YouTube announced it is now testing the AI summarizer launched last year on long-form video with Shorts. The feature uses AI to organize large comment sections on English-language Shorts into more palatable themes.

The AI summarizer is available on mobile, so if you’re in the experiment group, you’ll soon see a new option to sort by “Topics” on some Shorts when reading comments on your phone.

The new feature should help creators use comment summaries to jump into comment discussions on their video or create new content based on what their audiences are discussing.

Creators also have the ability to remove individual comments that show up under the specific topic. According to YouTube, the AI-generated “Topics” are pulled from published comments only and can’t be created from comments that are held for review, contain blocked words, or are from blocked users.

Announced over the weekend, the feature is rolling out on the YouTube mobile app to a small number of viewers on a small number of Shorts with large comment section. This means that even if you have access to AI summarizer, you might not see the feature available on all Shorts.

[ad_2]
Source link