Showing posts from February 21, 2015

Funding in digital services and technologies this week: February 16 to February 20/2014.

Compared to what we have captured last week (nearly $1.46 Billion), the kitty this week ($ 1.394 Billion) is more consistent, with an exciting focus on carpooling.
That said, recalls that Uber (carpooling and logistic) in its series E has once more captured a $1 billion.
The Series B landscape has enticed multiple investors with acceptable amounts. Online Learning Technologies and platforms have captured about $140 million and investors like Accel Partners, Technology Crossover Ventures, Project A Ventures, Temasek Holdings, H Capitaland Yuri Milner have been particularly more active.

Applicaster ($10M / Series B), offersbroadcast solutions for cross-screen TV experiences to synchronize mobile apps with TV programs. Founded in 2009 and based in Tel Aviv, Applicaster has released more than a hundred mobile apps for over three dozen broadcasters to date. Carmudi($25M / Series B), is a car classifieds site based in the Phillipines that focuses on emerging markets. Founded…

Lenovo turmoil: Proprietary software VS free software supporter and recommendations for social media platforms.

Lenovo lives henceforth in the complex stance where the company needs to work hard to restore the public trust. As announced yesterday, recalls that, security Experts have discovered a highly threatening vulnerability in software preinstalled on some Windows computers manufactured by Lenovo through January 2015. 
According to Zak Rogoff, Campaigns Manager at Free Software Foundation, ‘’Extreme negligence on the part of Lenovo and unscrupulous programming by its adware partner Superfish seem to have caused the vulnerability’’.

‘’The basis of the problem is a program by that is designed to interject advertisements into users' Web browsing. That's irritating, but it gets worse. Superfish also installs a certificate that intercepts Web traffic and cripples the host computer's ability to use HTTPS to validate the authenticity of Web sites. This leaves an open door for attackers to use fake versions of sites that should be secure -- like bank Web sites.
Whenever …

Apply game theory to big data.

In this approach, the combination of the real-time competitive analytics with the right time effect is a game-changer. talks about your ability to be where you need to be at the right time to prevent, understand, and solve.
In this dynamic, software exploits data analysis, machine learning and patented game-theoretic algorithms to convert data into meaningful visualizations and intelligence-driven deployment strategies. 
At Armorway, a company that applies game theory to big data using a suite of integrated applications, they have created a mathematically augmented security program that can generate exciting security plans using data from sources such as on-site cameras, historical crime records, social media, geolocation information, flight schedules, crowd movement patterns and real-time incident reporting. 
The company was founded in 2013 and builds on the research funded by the Department of Homeland Security over the past seven years at the University of Southern C…

Lenovo Computers Vulnerable to HTTPS Spoofing

Image recalls that, Lenovo consumer personal computers employing the pre-installed Superfish Visual Discovery software contain a critical vulnerability through a compromised root CA certificate. Exploitation of this vulnerability could allow a remote attacker to read all encrypted web browser traffic (HTTPS), successfully impersonate (spoof) any website, or perform other attacks on the affected system. Therefore recommends users and administrators to review Vulnerability Note VU#529496 and US-CERT Alert TA15-051A for additional information and mitigation details.