The Perfect Storm Team Mobile
859 views | +0 today
Follow
The Perfect Storm Team Mobile
Mobile Marketing Solutions, Trends & Strategy
Curated by Stan Smith
Your new post is loading...
Your new post is loading...
Rescooped by Stan Smith from Social Media Marketing Strategies
Scoop.it!

How to tailor your app display ads to targeted segments

How to tailor your app display ads to targeted segments | The Perfect Storm Team Mobile | Scoop.it
Are you tapping into the power of segmentation with your app ad creatives? Columnist Craig Weinberg takes a look at some brands that are doing it the right way so that you can learn from them.
Via Level343
more...
No comment yet.
Rescooped by Stan Smith from 21st Century Learning and Teaching
Scoop.it!

'Huge' number of Mac apps are vulnerable to man-in-the-middle attacks

'Huge' number of Mac apps are vulnerable to man-in-the-middle attacks | The Perfect Storm Team Mobile | Scoop.it
Many of OS X’s most popular apps were recently revealed to be vulnerable to man-in-the-middle (MiTM) attacks.

The vulnerability specifically targets those that use Sparkle — a third-party software update framework — and unencrypted HTTP connections.

A security engineer from Vulnsec, known as Radek, said the vulnerability works on both El Capitan and its predecessor, Yosemite.

The total number of apps affected isn’t known, but Radek did estimate the number to be “huge.” Some of those confirmed as vulnerable are:

Camtasia 2 (v2.10.4)
DuetDisplay (v1.5.2.4)
uTorrent (v1.8.7)
Sketch (v3.5.1)
Additionally, security researcher Jonathan Zdziarski told Ars Technica that the ‘Hopper’ reverse engineering tool and ‘DXO Optics Pro’ are also susceptible.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 


Via Gust MEES
more...
Gust MEES's curator insight, February 14, 2016 6:41 PM
Many of OS X’s most popular apps were recently revealed to be vulnerable to man-in-the-middle (MiTM) attacks.

The vulnerability specifically targets those that use Sparkle — a third-party software update framework — and unencrypted HTTP connections.

A security engineer from Vulnsec, known as Radek, said the vulnerability works on both El Capitan and its predecessor, Yosemite.

The total number of apps affected isn’t known, but Radek did estimate the number to be “huge.” Some of those confirmed as vulnerable are:

Camtasia 2 (v2.10.4)
DuetDisplay (v1.5.2.4)
uTorrent (v1.8.7)
Sketch (v3.5.1)
Additionally, security researcher Jonathan Zdziarski told Ars Technica that the ‘Hopper’ reverse engineering tool and ‘DXO Optics Pro’ are also susceptible.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, February 14, 2016 6:50 PM
Many of OS X’s most popular apps were recently revealed to be vulnerable to man-in-the-middle (MiTM) attacks.

The vulnerability specifically targets those that use Sparkle — a third-party software update framework — and unencrypted HTTP connections.

A security engineer from Vulnsec, known as Radek, said the vulnerability works on both El Capitan and its predecessor, Yosemite.

The total number of apps affected isn’t known, but Radek did estimate the number to be “huge.” Some of those confirmed as vulnerable are:

Camtasia 2 (v2.10.4)
DuetDisplay (v1.5.2.4)
uTorrent (v1.8.7)
Sketch (v3.5.1)
Additionally, security researcher Jonathan Zdziarski told Ars Technica that the ‘Hopper’ reverse engineering tool and ‘DXO Optics Pro’ are also susceptible.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Rescooped by Stan Smith from Business: Economics, Marketing, Strategy
Scoop.it!

Best Visual Marketing Apps to Create Social Media Graphics

Best Visual Marketing Apps to Create Social Media Graphics | The Perfect Storm Team Mobile | Scoop.it
Blog post at Rebekah Radice, Social Media Strategy : Are you using graphics in your social media posts?
Would you like to connect consumers to your business through visual marketing?
Not [..]

Via Pantelis Chiotellis
more...
Marco Favero's curator insight, March 27, 2015 6:44 AM

aggiungi la tua intuizione ...

Farah Jouffroy's curator insight, March 28, 2015 7:17 AM
Utilisez-vous des images, graphiques, visuels dans vos messages de médias sociaux ? Si oui, voici 7 applications de marketing visuels qui vous permettront de créer des messages qui claquent et donne du Peps ;-)
Scooped by Stan Smith
Scoop.it!

4 iPhone Apps That Use Geofencing (And, Geofencing, Explained)

4 iPhone Apps That Use Geofencing (And, Geofencing, Explained) | The Perfect Storm Team Mobile | Scoop.it

Exactly what is Geofencing? Geofencing is like creating an invisible fence around a location on a map, and if the iPhone enters or leaves that area, the iPhone performs an action like sending an alert or text message.

more...
No comment yet.
Rescooped by Stan Smith from Entrepreneurship, Innovation
Scoop.it!

Millions of people are paying for Jay-Z's music streaming app

Millions of people are paying for Jay-Z's music streaming app | The Perfect Storm Team Mobile | Scoop.it
Tidal has tripled its paid subscriber base over the past 6 months

Via Marylene Delbourg-Delphis
more...
No comment yet.
Rescooped by Stan Smith from Marketing Revolution
Scoop.it!

Peak iPhone? End of the Beginning or Beginning of the End?

Peak iPhone? End of the Beginning or Beginning of the End? | The Perfect Storm Team Mobile | Scoop.it
It's going to be very interesting to see Apple spin these financials results. The company just announced its Q1 2016 results, and the company posted recored qua...

Via Martin (Marty) Smith
more...
Martin (Marty) Smith's curator insight, January 26, 2016 9:18 PM

Peak iPhone? 5 Implications
Apple has more money than Ft. Knox, but iPhone sales dipped for the first time ever.  6s didn't feel like a "Must Upgrade" to us. Apparently that feeling was shared by many. If we've reached "Peak iPhone" are there implications across web marketing and app development? Yes and here are a few we see coming:

  • iPhones To The Breadbasket? Crossing The Chasm
  • Improving Competition
  • Think ECOSYSTEM not laptop, desktop or phone
  • Keep thinking Mobile First
  • Innovation is harder now


Moore's Adoption
Geoffrey Moore's classic Crossing The Chasm describes the tech adoption lifecycle from early adopters to the broad breadbasket of acceptance. If everyone can have an iPhone are iPhones still special. We say YES since Apple's tool is nothing if not a flexible magic wand


Competition Gets Better
Little doubt the bar for smartphones is high and getting higher. We admire Apple for creating a semi-open source developer network who've fought Google with innovation and quality. Apple's filter creates a high bar (though we believe some of the pain is inflated for the sake of being Apple). The question of open sources vs not remains unresolved. 

Ecosystems Not Phones, Laptops or Desktops

As our usage moves to the cloud our devices can afford to be smaller, cheaper and less powerful. Power lives in the cloud and in doing small things fast over and over instead of HUGE things rarely and with tremendous risks. 

Ecosystem is as much about PHILOSOPHY as anything. I'm an Apple guy and so my buying decisions are made. I also own a great Android phone, but my heart (my like me philosophy) is with Apple. 

Mobile First

Don't be fooled by Apple's first dip your mission, should you choose to accept it, is to MOBILIZE YOUR EVERYTHING. Every online marketer reading this note should be looking for ways to get on their customers phones in 2016. Smartphones = LIFE and Sustainability. 


Innovation Gets Harder
We are high up the tree now. Picking apples up here require more effort and fewer risks. Lower risks and rewards usually follow. iPhone sales dipped so the end is near misses the point. Innovation moves to web services now (can you say Uber?), the cloud and to a different kind of engineering - the kind of engineering disruptive artists create, understand and see. Innovation requires disruptive.. 

 

Rescooped by Stan Smith from 21st Century Learning and Teaching
Scoop.it!

How to Hack a Mobile App: It's Easier than You Think!

How to Hack a Mobile App: It's Easier than You Think! | The Perfect Storm Team Mobile | Scoop.it
How hackers are attacking binary code and mobile app vulnerabilities, and what you can do about it.

 

Learn more:

 

http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 


Via Gust MEES
more...
Gust MEES's curator insight, August 7, 2014 11:44 AM
How hackers are attacking binary code and mobile app vulnerabilities, and what you can do about it.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Scooped by Stan Smith
Scoop.it!

10 Mobile Apps No Conference Attendee Should Be Without

10 Mobile Apps No Conference Attendee Should Be Without | The Perfect Storm Team Mobile | Scoop.it
Mobile Apps for Conferences: Discover mobile apps that can help you maximize your time and results when attending your next real-world conference.
more...
No comment yet.