Search This Blog

Wednesday, September 25, 2013

80% of Location Data in Top Mobile Ad Exchanges is Inaccurate

As reported by GPS Business News: Location-powered ad exchange Verve has published last week a new report where it brings together key findings of its location-based advertising campaigns.

According to them 80 percent of lat/long ad requests found today in major ad exchanges are rubbish and made out of lesser quality data such as Geo-IP or ZIP code in an attempt by publishers to make bigger revenue out of their - poor quality - 'inventory'.

In a comparative test campaign Verve experienced a Clock-Through-Rate of 1.04% with verified location data versus 0.23% with unverified location data.
Other key findings from the report include:

- Retail is the number one category utilizing location powered advertising. The top three types of retailers using location powered advertising are big box, consumer electronics, and department stores.

 - Geo-fencing, which includes geo-conquesting, is the number one most utilized location targeting strategy deployed by retailers. 

- Driving foot traffic to stores is the number one objective for retailers leveraging location-based mobile advertising. 

- For retailers, proximity impacts mobile ad performance, the sweet spot for ads served being between 1 and 6 miles.

Tuesday, September 24, 2013

FDA to Focus on Apps That Turn Smartphones Into Medical Devices

A MIM Software app that allows doctors to view X-rays
and MRIs on smartphones and tablets was one of
the first to win FDA approval. 
(MIM Software photo / September 23, 2013)
As reported by ReutersThe Food and Drug Administration said Monday that it will focus on mobile medical apps that have the potential to harm consumers if they do not function properly.

The FDA, which issued final rules on the apps Monday, has cleared about 100 over the past decade, including products that can diagnose abnormal heart rhythms or help patients monitor their blood sugar. About 40 were cleared within the past two years.

The agency said it will not regulate the sale or general consumer use of smartphones or tablets or mobile app distributors such as the iTunes store or Google Play store.

It will, however, focus enforcement on products that transform smartphones into devices the agency currently regulates, such as electrocardiography machines that can determine whether a patient is having a heart attack.

The FDA will also focus on apps that would be used as an accessory to a regulated device, such as one that displays images used by physicians to make specific diagnoses. 

Google Adds Remote Lock and Password Reset Features to Android Device Manager

As reported by the Verge: Android users can now remotely lock down a misplaced or stolen device from the web. Google has rolled this critical feature into Android Device Manager, which launched last month with location tracking and remote wipe functionality. Now the web tool lets you lock any Android smartphone running version 2.2 of the operating system and above.

To do so, you'll simply need to set a new password to be entered once the device is recovered. This can be different from your regular lock screen PIN, so even if that password is compromised, you can override it with a new one.

Google is actively discouraging users from re-using their main Google credentials, however.

A lock request will immediately secure any device connected to Wi-Fi or a cellular network — even if it's actively being used. 

If a thief has turned off a phone or enabled Airplane Mode, the lock will take effect as soon as a data connection is reestablished. And should your beloved smartphone prove unretrievable, there's always the last-ditch measure of wiping its memory entirely.

Gecko Bluetooth tags act as motion and location triggers for your mobile

As reported by EngadgetWhat you see above isn't a fancy pick -- it's a gesture control peripheral called 'Gecko' designed to do a lot more than strum a guitar. 

According to its creators, each action the coin-sized gadget makes can correspond to a phone function, so long as the two are connected via Bluetooth. 

You could, for instance, configure your device loaded with the accompanying iOS or Android app to make an emergency call whenever you shake Gecko once. However, they claim that it also has many potential offbeat uses, such as notifying you when someone moves your bag or helping you find lost pets, kids or, worse, keys

Of course, that'll only work if you tag your items with it, but anyone with a hyperactive five-year-old wouldn't mind improvising a necklace out of it. Don't expect to find one at a local mall, though -- Gecko's merely an Indiegogo project at the moment, hoping to raise $50,000 to start mass production.  A video on the product can be found here.




 

GPS/GNSS Spoofing Test Bed to be Developed

As reported by Marine Link: Spirent Communications, has teamed up with Qascom to develop a test tool that reproduces spoofing attacks in a controlled laboratory environment. They say that their collaborative solution will be launched commercially later in 2013.

The test bed will concurrently simulate legitimate GPS/GNSS constellations and spoofed or hoax signals. It will enable positioning systems manufacturers to improve their products’ resilience to hoax signals.

As GPS/GNSS becomes increasingly embedded in modern infrastructure for application timing and device positioning, the impact of spoofing attacks becomes greater. From mobile telephony to Internet banking, GNSS timing signals are used in many key systems, and yet there is no requirement on GNSS equipment to demonstrate any degree of robustness to block or even detect malicious attacks that disrupt performance.

“There is growing industry concern about the vulnerability of satellite navigation signals,” said John Pottle, Marketing Director of Spirent’s Positioning Division. “This will help the industry to create positioning systems that are more resilient to interference.”

Hoax or spoofing attacks work by mimicking genuine GNSS signals, which mislead GNSS receivers. Often affected receivers do not recognize when they are receiving fake signals and continue to operate normally, but provide false time or position information. This new test tool helps to develop systems that will detect and counter spoofing attacks by providing a fully controllable laboratory based, non-radiated test solution to evaluate a receiver’s response to a range of spoofing attacks.

The test tool controls the emulation of signals representing both the genuine GNSS signals and the false signals. This allows users to simulate a wide range of sophisticated attacks and monitor the response of the receiver under attack to then improve the resilience of the design against such attacks.

Cyber-poachers Hack GPS Collar Data to Pinpoint Tigers

As reported by Times of India: Considering their long history as a favorite target among poachers, it's not surprising that Bengal tigers are now among the planet's most elusive creatures. But while most illegal hunters faced long days of bushwhacking through the dark jungle in hopes of spotting the big cat before it finds them, a dangerous new breed of cyber-savvy poachers may be on the rise -- using conservation tools to help target their illicit prey.

Wildlife officials responsible for monitoring the species in the Satpura-Bori tiger reserve say that their computer systems were recently hacked to collect data from a tiger's GPS collar. The cyber crime, the first of its kind, would allow the poachers real-time data on where the animals were within the reserve, eliminating the dangerous work of tracking them down.

The Times of India reports that location data on at least one collared tiger, identified as Panna-211, may have been compromised. Normally, access to such sensitive information is strictly limited; only three wildlife specialists possess passcodes to view the GPS tracking data.

Since the perpetrator is yet unknown, nor the viability of the hacked information, officials say they will be closely monitoring Panna-211's movement for the next 6 months.

As many iconic endangered species continue to decline due to poaching, conservationists have increasingly begun turning to high-tech tools to aid in their protection. In wrong hands, however, the information could be immensely valuable to criminals with the opposite intention.

Monday, September 23, 2013

BlackBerry may have a deal

BlackBerry may have found a buyer in a consortium
led by Fairfax Financial, which has a letter of intent signed by BlackBerry
 to sell the company at $9 per share, or roughly $4.7 billion.
As reported by GigaOM: BlackBerry shares were halted on Monday afternoon for the second time within a week.

The company has signed a letter of intent to be purchased by a consortium that already owns stock equating to around 10 percent of BlackBerry. The potential buyer is “a consortium led by Fairfax Financial” according to the Wall Street Journal, with the deal valued at $4.7 billion.

Fairfax Financial will get six weeks for due diligence with an agreement expected on November 4, pending its review of the company, says The Globe and Mail.

The publication also reports that the consortium already has funding lined up for the deal. BlackBerry is still expected continue to re-focus efforts on the enterprise market instead of the consumer market where it never regained traction as iPhones and Android phones have grown sales at the expense of BlackBerry devices.