<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hackers Enigma</title>
	<atom:link href="https://hackersenigma.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://hackersenigma.com</link>
	<description></description>
	<lastBuildDate>Thu, 18 Jul 2019 09:50:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://hackersenigma.com/wp-content/uploads/cropped-Hackersenigma-new-logo-02-32x32.png</url>
	<title>Hackers Enigma</title>
	<link>https://hackersenigma.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Importance Of Using A Vulnerability Scanner For Security</title>
		<link>https://hackersenigma.com/the-importance-of-using-a-vulnerability-scanner-for-security/</link>
					<comments>https://hackersenigma.com/the-importance-of-using-a-vulnerability-scanner-for-security/#comments</comments>
		
		<dc:creator><![CDATA[Amol Wagh]]></dc:creator>
		<pubDate>Sat, 01 Jun 2019 17:45:55 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[automated scan]]></category>
		<category><![CDATA[GFI]]></category>
		<category><![CDATA[manual scan]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[using vulnerability]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[vulnerability scanners]]></category>
		<guid isPermaLink="false">http://hackersenigma.com/?p=622</guid>

					<description><![CDATA[One aspect of network security that is often overlooked is checking a network for issues using a vulnerability scanner. Vulnerabilities are issues, weaknesses or misconfiguration in software that an attacker can exploit]]></description>
										<content:encoded><![CDATA[<p><!--INFOLINKS_OFF--><br />
One aspect of network security that is often overlooked is checking a network for issues using a vulnerability scanner. Vulnerabilities are issues, weaknesses or misconfiguration in software that an attacker can exploit to gain unauthorized access to his victim’s system. Through the use of a vulnerability scanner, these issues are pinpointed and reported to the administrator.</p>
<p>Perhaps the primary reason why vulnerability scanning is taken for granted is because vulnerabilities are considered to be issues which are fixed through patch management. It is a common misconception that with a patch management strategy, the vulnerabilities found on the network are also being taken care of. This is partially true when considering how a chunk of vulnerabilities are in fact software issues that are fixed by patching, however it is not always the case. Vulnerabilities can be caused by mis-configurations, software that is inherently problematic or even software issues for which the vendor has not yet released a patch.</p>
<h3><strong>What can we do about vulnerabilities?</strong></h3>
<p>The first step is to see if your system does in fact have any vulnerability and employing <a href="https://www.elinext.com/qa-testing/">an independent QA tester</a> is a good idea. For this you need to use a vulnerability scanner or, although not recommended if your budget is limited, you can run a vulnerability scan manually.</p>
<h3><strong>Running a vulnerability scan manually:</strong></h3>
<p>It is possible to do a vulnerability assessment without the use of any software, although this will have an intrinsic amount of inaccuracy and will be very time consuming. In order to determine if there are vulnerabilities on your network through a manual vulnerability scan, you should first get a list of applications / services installed on your network. Once the list is available, check each software’s official site to see if there are any issues / insecurities reported by the vendor. Some vendors will also offer guides on how their application should be configured securely. Generally, such guides will also contain information on what configuration options to avoid. This information is very useful and it is definitely a good idea to read them. The next step is to check vulnerability database sites for the latest lists. Sites like the National Vulnerability Database and Bugtraq are a central location for known vulnerabilities – checking these sites regularly in relation to what software is running on your network is highly important.</p>
<h3><strong>Running a vulnerability scan using a vulnerability scanner:</strong></h3>
<p>A more effective way to do vulnerability scanning is through the use of a vulnerability scanner. These scanners will have a database of vulnerabilities that is automatically updated by the vulnerability scanner vendor whenever a new vulnerability is discovered. An administrator can set up the scanner to automatically scan the network periodically and issue reports when a new vulnerability is detected. It might also offer remediation options or a detailed description of what is causing the vulnerability and what should be done to fix that vulnerability.</p>
<p>Regardless of whether you run a vulnerability scan manually or using a vulnerability scanner, your network should be monitored for vulnerabilities.  Most vulnerabilities will lead to a system compromise of some degree which in turn can result in serious consequences for the business.  Vulnerability scanning is a preventive measure that can potentially save your business’s reputation and assets.</p>
<p><em>This guest post was provided by <strong>Emmanuel Carabott </strong>on behalf of GFI Software Ltd. <strong>GFI</strong> is a leading software developer that provides a single source for network administrators to address their network security, content security and messaging needs. More information: GFI </em><a href="http://www.gfi.com/lannetscan/network-auditing-software.htm"><em>vulnerability scanner</em></a></p>
<p><em>*All product and company names herein may be trademarks of their respective owners.</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://hackersenigma.com/the-importance-of-using-a-vulnerability-scanner-for-security/feed/</wfw:commentRss>
			<slash:comments>11</slash:comments>
		
		
			</item>
		<item>
		<title>Finance is The Most Attacked Sector in Past 7 Years</title>
		<link>https://hackersenigma.com/finance-is-the-most-attacked-sector-threat-report-2019/</link>
					<comments>https://hackersenigma.com/finance-is-the-most-attacked-sector-threat-report-2019/#respond</comments>
		
		<dc:creator><![CDATA[Amol Wagh]]></dc:creator>
		<pubDate>Wed, 17 Apr 2019 05:07:14 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">http://hackersenigma.com/?p=3398</guid>

					<description><![CDATA[States 2019 Global Threat Intelligence Report by NTT Security NTT Security report shows education is a new entry to five most attacked industries, with an increase in coin mining campaigns]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">States 2019 Global Threat Intelligence Report by NTT Security</h2>



<p></p>



<p><em>NTT Security report shows education is a new entry to five most attacked industries, with an increase in coin mining campaigns largely to blame</em></p>



<p><strong>NTT Security</strong>, the specialized security company, has launched its 2019 Global Threat Intelligence Report (GTIR) which reveals finance as the most attacked sector for six of the past seven years, accounting for 17% of all attacks. The technology sector joined finance this year with 17% of the attacks. Education and government are both new entries in the list of global top five industries – rising from 4% to 11% and 5% to 9% respectively – with coin mining campaigns largely to blame for the increased attacks in educational environments.</p>



<p>NTT Security summarizes data from trillions of logs and billions of attacks for the 2019 GTIR, which analyzes threat trends based on log, event, attack, incident and vulnerability data from NTT Group operating companies. In the new report, NTT Security continues its analysis of attacks against 18 industry sectors and shares its observations of the challenges faced by organizations globally.</p>



<figure class="wp-block-image"><img fetchpriority="high" decoding="async" width="960" height="641" src="https://hackersenigma.com/wp-content/uploads/finance-sector-threat-report-2019.jpg" alt="" class="wp-image-3400" srcset="https://hackersenigma.com/wp-content/uploads/finance-sector-threat-report-2019.jpg 960w, https://hackersenigma.com/wp-content/uploads/finance-sector-threat-report-2019-150x100.jpg 150w, https://hackersenigma.com/wp-content/uploads/finance-sector-threat-report-2019-300x200.jpg 300w, https://hackersenigma.com/wp-content/uploads/finance-sector-threat-report-2019-768x513.jpg 768w" sizes="(max-width: 960px) 100vw, 960px" /></figure>



<p>The GTIR also reveals how coin mining is leading the evolution of malware and how cyber attackers are increasingly adapting their attack patterns and intrusion sets to include coin mining in their toolkits. Illicit coin mining accounted for a significant amount of activity during the past year, with the technology and education sectors making up over 86% of all coin mining detections. The most active coin miners detected were XMRig (62%) – commonly used by Rocke, 8220 Mining Group and Tor2Mine – followed by CoinHive (24%) and Coin Miner (13%).</p>



<p>In the GTIR, credential theft and web-application attacks were found to be among the most prevalent activities during the past year. The most common technical attack used to commit credential theft was phishing (67%) with attackers targeting credentials for Microsoft (45%), Google (27%), PayPal (15%) and DocuSign (10%) in an attempt to gather usernames and passwords.</p>



<p>Globally, organizations experienced an average of 32% of all attacks as web attacks, a number which has crept up slightly from 29% in 2017. Finance became the most targeted industry, accounting for 46% of web attacks, reinforcing its vulnerability to these types of cyberattacks.</p>



<p>John South of the Threat Intelligence Communication Team, Global Threat intelligence Center at NTT Security, says:&nbsp;<br>“Finance is yet again on the top spot when it comes to targeted attacks, which surely is enough evidence to convince the board that cybersecurity is a must-have investment. Many financial organizations are moving forward with digital transformation but without prioritizing security as a core business requirement. While legacy methods and tools are still effective at providing a solid foundation for mitigation, new attack methods are continually being developed by malicious actors. Security leaders should ensure basic controls remain a primary focus but they must also embrace innovative solutions if they provide a good fit and true value.”</p>



<p>Mr. Fumitaka Takeuchi, Security Evangelist, Vice President, Managed Security Service Taskforce, Corporate Planning at NTT Communications, says:&nbsp;<br>“Many organizations are caught up in simply buying solutions to problems that either don‘t really exist, or a solution which costs more than the potential loss being prevented. Our advice for organizations, regardless of the industry they operate in, is to leverage existing relationships with trusted experts and to keep an eye on professional and managed service maturity in the cybersecurity space. First and foremost, it is essential to know where the real risks lie and then develop solutions accordingly.”</p>



<p>Matthew Gyde, Group Executive – Cybersecurity at Dimension Data, says:&nbsp;<br>“This year’s GTIR clearly demonstrates that cybersecurity attacks are constantly evolving. While attack volumes don’t always increase, new threats are certainly being introduced. In fact, 2018 set a record for the number of new vulnerabilities identified and reported in a single year. NTT Group has spent the last 15 years working with our clients to help them defend against the evolving threat landscape which is increasingly complex. Understanding the threat environment helps our clients predict and mitigate potential threats in the digital world.”</p>



<p>“The threat report indicates the variety of attacks is not as broad as it would seem, while the United States and China are also often identified as the most common attack sources,” said Mike Barch, VP of Security Services, NTT DATA Services. “As frequently attacked industries, such as health care and financial services, safeguard their businesses from sophisticated cybercriminals, leaders must ensure a completely secure infrastructure, from endpoint to core, that allows them to focus on daily operations.”</p>



<p><strong>Summary of other key global findings:&nbsp;</strong></p>



<ul class="wp-block-list"><li>Finance is one of just two industries (alongside the technology sector) to appear in the top five in every geographic region (Americas, Asia-Pacific and EMEA as well as globally)</li><li>Like finance, the technology industry accounts for 17% of all attacks (albeit both of which saw a drop from 26% and 19% last year respectively). It is followed by business and professional services (12%), education (11%) and government (9%)</li><li>The technology sector accounted for 46% of all coin mining detections followed by education (40%), health care (9%), business and professional services (2%), and finance (1%) sectors to round out the top five industries impacted</li><li>Coin mining ran on systems in which the malicious application was using as a host (75%), as opposed to JavaScript (web-based) coin mining (25%). Education was the most observed sector for coin mining malware, at 52%, followed by technology (46%)</li><li>73% of all hostile activity falls into four categories: web attacks, reconnaissance, service-specific attacks, and brute-force attacks – up from 52% the previous year</li><li>Application-specific and web-application attacks doubled over the past year. Attacks targeting bash, Apache Struts and Samba accounted for 54% of all hostile activity</li><li>Web attacks accounted for 32% of all hostile traffic – rising to over 53% of hostile activity against the most attacked industries in EMEA</li><li>35% of all attacks originated from IP addresses within the United States and China. The remaining attack sources varied across regions, with EMEA and APAC each showing a significant amount of attacks from within their own region.</li></ul>



<p>To learn more about the how this year’s GTIR offers organizations a robust framework to address today’s cyber threat landscape, follow the link to download the NTT Security 2019 GTIR:&nbsp;<a href="https://www.nttsecurity.com/2019gtir">www.nttsecurity.com/2019gtir</a></p>



<p>NTT Security summarizes data from trillions of logs and billions of attacks for the 2019 GTIR. NTT Security gathers security log, alert, event and attack information, enriches it to provide context, and analyzes the contextualized data. This process enables real-time global threat intelligence and alerting. The size and diversity of our client base, with over 10,000 security clients on six continents, provides NTT Security with security information which is representative of the threats encountered by most organizations.</p>



<p>The data is derived from worldwide log events identifying attacks based on types or quantities of events. The use of validated attack events, as opposed to the raw volume of log data or network traffic, more accurately represents actual attack counts. Without proper categorization of attack events, the disproportionately large volume of network reconnaissance traffic, false positives, authorized security scanning and large floods of DDoS monitored by Security Operations Centers (SOCs), would obscure the actual incidence of attacks.</p>



<p>The inclusion of data from the 10 SOCs and seven research and development centers of NTT Security provides a highly accurate representation of the ever-evolving global threat landscape.</p>



<p><strong>Source: <a href="https://www.nttsecurity.com/en-us/about/press-releases/detail/2019-global-threat-intelligence-report-finance-remains-most-attacked-sector-globally-six-of-the-past-seven-years">NTT Security</a></strong><br></p>
]]></content:encoded>
					
					<wfw:commentRss>https://hackersenigma.com/finance-is-the-most-attacked-sector-threat-report-2019/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>8 Quick Tips To Stay Secure While Gaming Online</title>
		<link>https://hackersenigma.com/8-quick-tips-to-stay-secure-while-gaming-online/</link>
					<comments>https://hackersenigma.com/8-quick-tips-to-stay-secure-while-gaming-online/#respond</comments>
		
		<dc:creator><![CDATA[Amol Wagh]]></dc:creator>
		<pubDate>Tue, 02 Apr 2019 12:17:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://hackersenigma.com/?p=3393</guid>

					<description><![CDATA[Gaming online has become a lucrative market and many small and medium-sized businesses are taking part in the growth of this industry by offering their unique game experiences. As a]]></description>
										<content:encoded><![CDATA[
<p>Gaming online has become a lucrative market and many small and medium-sized businesses are taking part in the growth of this industry by offering their unique game experiences. As a player, we have a lot of options to choose from, and a lot of offers to fall prey to, especially if you&#8217;re not concerned about your <a href="https://www.minimumdepositcasinos.org/2019/01/24/how-secure-are-online-casinos/">online gaming security</a>. Things are even worse for games that involve financial participation like online gambling or poker.</p>



<p>Today, we&#8217;re giving you 8 handy tips along with answers to some most asked questions related to this issue.&nbsp;</p>



<h2 class="wp-block-heading">8 Quick Tips for Online Gaming Security</h2>



<p><strong>1.</strong> Always choose a username that does not resemble your actual name. Make sure that you reveal the least amount of your personal information to other players while playing online.</p>



<p><strong>2.</strong> The importance of using strong passwords for your online accounts cannot be stressed anymore. Everyone is aware of how important your username and passwords are. So make sure it is strong and do not share it with anyone else.</p>



<p><strong>3.</strong> When you are done playing online games, make sure that you log out of the website before you close the browser. Many of us tend to simply close the browser when we are done with our task. But this can prove risky as you still seem active for the online game and some hacker can exploit this vulnerability.</p>



<div class="wp-block-image"><figure class="aligncenter is-resized"><img decoding="async" src="https://hackersenigma.com/wp-content/uploads/e3980dc5ec2b425e62fca58c5a45a9a0-1024x722.jpeg" alt="" class="wp-image-3331" width="418" height="294" srcset="https://hackersenigma.com/wp-content/uploads/e3980dc5ec2b425e62fca58c5a45a9a0-1024x722.jpeg 1024w, https://hackersenigma.com/wp-content/uploads/e3980dc5ec2b425e62fca58c5a45a9a0-150x106.jpeg 150w, https://hackersenigma.com/wp-content/uploads/e3980dc5ec2b425e62fca58c5a45a9a0-300x212.jpeg 300w, https://hackersenigma.com/wp-content/uploads/e3980dc5ec2b425e62fca58c5a45a9a0-768x542.jpeg 768w" sizes="(max-width: 418px) 100vw, 418px" /></figure></div>



<p><strong>4.</strong> When you gamble online, you tend to win and lose, and the amount is credited or debited from your account accordingly. So go through your bank statement carefully and see if the transactions are correct and that no fraud has taken place.</p>



<p><strong>5.</strong> Before you go online for your gambling session, make sure that you have a good antivirus, and it is fully updated and the firewall is running.</p>



<p><strong>6.</strong> If you get emails from companies which you don’t recognize, DO NOT REPLY!</p>



<p><strong>7.</strong> When you are gambling, keeping a constant check on your spending should be your number 1 habit.</p>



<p><strong>8. The Basics of Random Number Generators (RNGs):</strong> Gambling works on numbers. Online casino’s use “Random Number Generators” (RNGs) tool to create a truly random number. You have absolutely no way to identify if the number generated in the game at the casino is fair or not. Online casino’s use virtual slot reels and decks of cards. Therefore, the RNG is the only tool which can ensure that the spin of the slot or the deal of the card is truly based on chance and is not rigged by any outside force.</p>



<p>A reputable online casino will always provide complete information about their RNG to the users. They will also employ third-party independent companies to regularly test and verify their RNG. The results of these verifications should be easily available on the casino’s website.</p>



<h3 class="wp-block-heading">Be Aware of Fairness in Online Gaming, Here are some most asked questions&#8230;</h3>



<h4 class="wp-block-heading"><strong>What is eCOGRA?</strong></h4>



<p>e-Commerce and Online Gaming Regulation and Assurance, shortly known as eCOGRA, is an organization that audits and monitors online gambling operators globally. This organization is recognized globally by all reputed online casino’s worldwide.</p>



<p>The casinos certified by eCOGRA will display the eCOGRA seal on their website. You can click on this seal to know more about the particular aspects of the casino’s operation that were audited or tested by eCOGRA. This seal is a sign of trust for the users.</p>



<h4 class="wp-block-heading"><strong>What is TST?</strong></h4>



<p>Technical Systems Testing (TST) is a globally recognized organization for testing and compliance of casinos and other online gaming companies. This organization provides various auditing services to secure online gaming companies and casinos.</p>



<h4 class="wp-block-heading"><strong>What is the Payout Percentage?</strong></h4>



<p>The average rate of return for a given game is called as a payout percentage. Example: If a slot machine has a return rate of 90%, then this means that in aggregate, if $1.00 is wagered, then $0.90 will be returned to the players in winnings</p>



<p>Why do Payout Percentages vary across games?</p>



<p>There are a lot of reasons for this. Not each game has the same structure. Due to the different structure of the games, the payout is different. You may see that games with big-ticket jackpots will give you a worse payout percentage overall. Some casino’s, to promote themselves, will offer a higher payout percentage. And some games can offer better odds than other games.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://hackersenigma.com/8-quick-tips-to-stay-secure-while-gaming-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Web Security Can Help Boost Online Retail Sales Beyond Black Friday</title>
		<link>https://hackersenigma.com/web-security-can-help-boost-online-retail-sales-beyond-black-friday/</link>
					<comments>https://hackersenigma.com/web-security-can-help-boost-online-retail-sales-beyond-black-friday/#respond</comments>
		
		<dc:creator><![CDATA[Amol Wagh]]></dc:creator>
		<pubDate>Thu, 07 Mar 2019 02:41:05 +0000</pubDate>
				<category><![CDATA[Business Security]]></category>
		<guid isPermaLink="false">http://hackersenigma.com/?p=3383</guid>

					<description><![CDATA[It is that time of the year when consumers and retailers alike are focused on Black Friday and Cyber Monday sales. In a tradition that started in the US and]]></description>
										<content:encoded><![CDATA[<p>It is that time of the year when consumers and retailers alike are focused on Black Friday and Cyber Monday sales. In a tradition that started in the US and has already spread across the world, the day after Thanksgiving sees countless retailers offer immense discounts on products and consumers hurrying into a shopping frenzy to take advantage. But a study suggests that consumers might be willing to spend even more online if they are reassured that their safety is a top priority.</p>
<h2>2017 Cyber Monday and Black Friday Broke Record in Spending</h2>
<p>Black Friday is generally perceived as one of the top spending days for retailers across the globe – and much of that money is spent on online purchases. <a href="https://www.retaildive.com/news/meet-the-winners-and-losers-of-black-friday-2017/511661/">In 2017 alone, online shopping reached $5.03 billion</a>, which marked an almost 17% rise from the $4.3 billion spent the year before that. Smartphones contributed a large chunk of that figure, as it was estimated that 54% of visits and 37% of spending were carried out through mobile devices – with smartphones up by over 16% and tablets up by 13% in conversion rates from the year before. These figures were boosted by the following Cyber Monday, which set a record of $6.59 billion in online retail sales, up by 16.8% from the $5.46 billion spent in 2016.</p>
<p><em><img decoding="async" class="aligncenter size-full wp-image-3389" src="https://hackersenigma.com/wp-content/uploads/thanksgiving_weekend_e_commerce_sales_n.jpg" alt="" width="960" height="684" srcset="https://hackersenigma.com/wp-content/uploads/thanksgiving_weekend_e_commerce_sales_n.jpg 960w, https://hackersenigma.com/wp-content/uploads/thanksgiving_weekend_e_commerce_sales_n-150x107.jpg 150w, https://hackersenigma.com/wp-content/uploads/thanksgiving_weekend_e_commerce_sales_n-300x214.jpg 300w, https://hackersenigma.com/wp-content/uploads/thanksgiving_weekend_e_commerce_sales_n-768x547.jpg 768w" sizes="(max-width: 960px) 100vw, 960px" /><br />
You will find more infographics at <a href="https://www.statista.com/chartoftheday/">Statista</a></em></p>
<h2>Web Security Key to Boosting Sales</h2>
<p>Shoppers are eager to take advantage of sales season, especially on a day that advertises a blink-and-you’ll-miss-it approach to unmatched discounts, but that does not mean that they are not looking for opportunities to spend all year long. The general trend is clear: in-store traffic keeps declining, as consumers are drawn to the convenience of online shopping. Easier browsing from your couch, comparing items and prices in a matter of seconds, and delivery straight to your door are among the advantages that online shoppers enjoy. By appealing to a wider consumer base, online retailers can enjoy Black Friday figures all year long – and it seems that apart from <a href="https://www.promotionseo.com/">referring to an Internet Marketing agency</a> there is onemore way to do that &#8211; by offering a secure online shopping experience.A recent study suggests that <a href="https://www.imperva.com/products/web-application-firewall-waf/">web security, which includes safeguards such as a WAF</a> to protect against web application attacks, two-factor authentication to prevent unauthorized access, and protection from advanced persistent threats, are crucial for businesses looking to convert more consumers.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-3384 " src="https://hackersenigma.com/wp-content/uploads/shopping-security-1024x683.jpg" alt="Web Security for Online Shopping" width="800" height="533" srcset="https://hackersenigma.com/wp-content/uploads/shopping-security-1024x683.jpg 1024w, https://hackersenigma.com/wp-content/uploads/shopping-security-150x100.jpg 150w, https://hackersenigma.com/wp-content/uploads/shopping-security-300x200.jpg 300w, https://hackersenigma.com/wp-content/uploads/shopping-security-768x512.jpg 768w, https://hackersenigma.com/wp-content/uploads/shopping-security.jpg 1125w" sizes="auto, (max-width: 800px) 100vw, 800px" /><em>                                                                  Source: <a href="https://www.pexels.com/photo/working-macbook-computer-keyboard-34577/">Pexels</a></em></p>
<h2>67% of Consumers Value Safety When Shopping Online</h2>
<p><a href="https://www.prnewswire.com/news-releases/survey-indicates-2018-black-friday-shoppers-will-choose-comfort-over-chaos-300741167.html">This survey reveals that almost 85% of all shoppers</a> buy at least some of the products they need online, with roughly 45% stating that more than 50% of their purchases are made online. According to the same source, most of those who shop online are worried about the cybersecurity of the websites they make their purchases on. 43.6% of respondents worry that their credit card information might be hacked and 34% have stated that they are afraid their credit card details might be stolen through a malware attack, and only 33.1% store their payment details on the websites they buy from. Yet, 67% stated that they would prefer buying online from a website that they know had security measures in place.</p>
<p>In the age of ransomware and bots, it is only natural that consumers are beginning to take note of cybersecurity measures when shopping online – the real question is, are online retailers doing everything they can?</p>
]]></content:encoded>
					
					<wfw:commentRss>https://hackersenigma.com/web-security-can-help-boost-online-retail-sales-beyond-black-friday/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cortexica Delivers &#8216;Machine Learning Models-as-a-Service&#8217; on AWS Marketplace for Machine Learning</title>
		<link>https://hackersenigma.com/cortexica-delivers-machine-learning-models-as-a-service-on-aws-marketplace-for-machine-learning/</link>
					<comments>https://hackersenigma.com/cortexica-delivers-machine-learning-models-as-a-service-on-aws-marketplace-for-machine-learning/#respond</comments>
		
		<dc:creator><![CDATA[Amol Wagh]]></dc:creator>
		<pubDate>Fri, 30 Nov 2018 16:14:03 +0000</pubDate>
				<category><![CDATA[AI & Machine Learning]]></category>
		<guid isPermaLink="false">http://hackersenigma.com/cortexica-delivers-machine-learning-models-as-a-service-on-aws-marketplace-for-machine-learning/</guid>

					<description><![CDATA[Press Release &#8211; updated: Nov 29, 2018 10:00 EST LONDON, UNITED KINGDOM, November 29, 2018 (Newswire.com) &#8211; ?????Today, Cortexica publishes 5 of its models to Amazon Web Services (AWS) Marketplace for]]></description>
										<content:encoded><![CDATA[<div>
<div readability="33">
<p>
		<span class="ai-category">Press Release</span><br />
	<span class="dash">&#8211;</span><br />
		<span class="ai-date"><br />
									<span class="status-true"><br />
									updated: Nov 29, 2018 10:00 EST							</span><br />
			</span>
</p>
</p></div>
<div readability="103.51531291611">
<p><strong class="date-line color-pr"><br />
			LONDON, UNITED KINGDOM,<br />
			November 29, 2018			(Newswire.com) &#8211;<br />
	</strong><br />
?????Today, Cortexica publishes 5 of its models to Amazon Web Services (AWS) Marketplace for Machine Learning, allowing all developers to build and deploy their own Artificial Intelligence (AI) applications.</p>
<p><em>“We all know that machine learning and AI look to change the workplace, in terms of improving productivity and increasing sales. However, many companies are yet to fully embrace and incorporate these technologies into their process, applications and hardware.  The reality is, not many companies have the data engineers or scientists available to deep dive into a world of AI-driven transformation. But, with the launch of the AWS Marketplace for Machine Learning, it changes this by making machine learning accessible to everyday developers and facilitates a much faster process to build and deploy machine learning models.”  <strong>Comments Stuart Hubbard, CTO at Cortexica.</strong></em></p>
<p>Cortexica currently has 5 machine learning models available on AWS Marketplace for Machine Learning, designed for: </p>
<p>1.   Fashion localiser (CPU): Detect multiple items of clothing within an image<br />2.   Fashion localiser (GPU)<br />3.   Interiors localizer: Detect items of furnishing within an image<br />4.   Person detection: Detect people within an image<br />5.   Body part detection: Detect different body parts of people within an image</p>
<p>One example of where Cortexica adds value is working in partnership with Hammerson, a retail property group with a portfolio of 22 shopping centres and 15 retail parks in 14 countries, for the delivery of its AI-powered visual search technology in its app ‘Style Seeker’. </p>
<p>For Hammerson, it is extremely important to make shopping in their centres a positive and immersive experience for both retailers and customers. </p>
<p>Taking a lead in digital innovation with its latest app, ‘Style Seeker’, powered by Cortexica’s visual search and image recognition technology, customers are able to search almost 360,000 items from brands like John Lewis, River Island &#038; Next in one click, whilst continuing to enjoy a leisurely shopping centre experience.</p>
<p><strong>&#8212;&#8212;&#8212;&#8211; ENDS &#8212;&#8212;&#8212;&#8211;</strong></p>
<p>For further information contact Angela Kennedy on info@cortexica.com or +44 (0) 203 868 8880</p>
<p><strong><a href="https://www.cortexica.com" target="_blank">About</a> <a href="https://www.cortexica.com" target="_blank">Cortexica</a><br />?<br />?</strong>Cortexica are leaders in AI, Machine Learning and Computer Vision for image and video analysis. Focused on creating and turning cutting-edge AI and machine learning research into real world solutions that make businesses commercially stronger.</p>
<p>Starting life from the Bio-engineering Department at Imperial College London, Cortexica originated from a research project to reverse-engineer the human visual cortex, and now has its own team of PhD researchers and engineers that form the back bone of its video centre of excellence. </p>
<p>We are proud to be independent whilst pro-actively partnering with Cisco, Accenture, Axis, AAEON, Intel, as well as global leading academic institutions. </p>
<p class="text-alt">Source: Cortexica</p>
</p></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://hackersenigma.com/cortexica-delivers-machine-learning-models-as-a-service-on-aws-marketplace-for-machine-learning/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
