Â Â Echosec is a location based social media platform, tell us about the team behind it.Echosec was started in Victoria, Canada by Karl Swannie in late 2013. Built of the side of his desk while working at his GIS company, Karl quickly realized that the core technology of Echosec was capable of a different direction and scale than his current business. While looking for investment, he was introduced to the Owen Matthews, son of Sir Terry Matthews, and the Alacrity Foundation. From this introduction, Karl secured venture capital financing and was introduced to what would become the rest of the founding team â€“ three engineering masterâ€™s students â€“ Jason Jubinville, Michael Anderson, and Nicholas Turner.After scaling out for spring and summer of 2014, Echosec made its first hire in December of 2014. Through introductions made by the Alacrity foundation, Echosec hired a Welsh team to work on sales and marketing efforts for the UK and the EU. Under Managing Director Ben Milsomâ€™s influence, Echosec UK would grow to be an integral part of the Echosec teamSince then, Echosec has grown to a team of 17 people across the two offices with clients from around the world.Â With so many social media platforms around, why did you see the need for another?Â When we started our platform, most â€˜competitorsâ€™ were in the brand management space and provided outbound messaging services. Most solutions focused on only one or two social media platforms. These platforms would use account engagement, or keyword and sentiment analysis to conduct and measure the success of marketing campaigns.Echosec was always a data first platform, we didnâ€™t want to stop at just Twitter or Instagram, we wanted to get every feed that we could. We also wanted to focus on location relevance instead of keyword or username analysis. We saw a space in the market for that.Â So tell us about how Echosec actually works from a user perspective.Â The basic workflow for an Echosec search is: 1. Pick a location of interest anywhere in the world 2. Draw a search boundary directly on the map using our browser based interface 3. Filter and analyse the social media results directly in the application 4. Compile summary statistics and setup up alerts or notificationsÂ On the back end, how did you pull the entire concept together?Â Well, no backend infrastructure is dreamt-up and implemented in a single night. The development team has been working at improving on our design since Echosecâ€™s inception in 2014. The backend architecture team has a wealth of experience in scalable infrastructure and cloud deployments from both academicia and the private sector. This experience allows us to tackle one scalability hurdle at a time while still managing the massive amount of information that passes through our system every minute.Â Social media has become so important for sharing news and information, how useful has it been as a marketing tool for Echosec?Especially during the early days, social media marketing was very important to our success. Echosec is in a unique position where our customers are actively using/searching social media when they might encounter our marketing materials. We can point to any number of occasions where clients were carrying out their day-to-day work, stumbled across our content and thought, â€œwow, that definitely solves the problem I am having right now.â€Â What have you found to be the most useful social media platform to market your business?Â Twitter. Twitter is by far the most business-oriented platform. It is also where many of our clients go to first when they are looking to engage with consumers or to invest in social media discovery. While it was, and remains to be, the best resource to market our solution on social media, we donâ€™t necessarily expect it to remain that way. The social media landscape is always changing and itâ€™s our job to stay ahead of the curve.Â Â What advice would you give to young entrepreneurs who want to get into the tech industry?There are probably too many to list, but here are a few:Â All you need is a laptop and an internet connection. You donâ€™t need to know how to code. You donâ€™t need to have a wealth of business savvy. Sure, it helps. But really, it doesnâ€™t take any of that to validate a business idea and get going. You can learn the rest along the way.If you are no longer embarrassed about a part of your platform, you have shipped too late. The idea is to get your MVP to market as fast as possible and iterate on it based on real customer feedback. Every new product will have bugs and require new features here and there, better to get that feedback today than six months after you invested in the wrong direction.And network. In the early days of your business, people are buying into you just as much as they are buying into your product idea or business. Organisations and events that allow you to expand that network and get out there are invaluable â€“ Innovation Point, Tech Dragons, and Cardiff Start to name a few.
Source: Meet the founders of Echosec â€” Entrepreneurs | Startups | Small Business Owners
Despite a search warrant, Amazon won’t hand over the audio records transmitted through an Echo device that belongs to a man charged with murder.
Source: Amazon refuses to give police Echo voice data in murder case – Business Insider
Uber raises privacy concerns with location tracking update
Source: Uber wants to know where you go – after you leave its cars | IT PRO
Source: PHA Fraud Forum 2016 – Speakers | Private Healthcare Australia
Tony has over 26 yearsâ€™ experience as an investigator and intelligence operative within the UK police service. A subject matter expert in Intelligence Gathering, Open Source Investigation, The Internet, Cyber Crime, Digital Forensics and Investigation Skills.
Tony holds an Masters Degree in Computer Forensics and has spent several years in charge of a Police Cyber Forensics team in the UK police service.
During the end of and after his police service Tony has also taught many hundreds of investigators, mostly from law enforcement but also from local authorities and insurance companies, as well as private investigators and journalists, in the art of using the Internet as an Investigative Tool. These courses have mostly been in the UK but have also been given in a number of different countries around the World.
In 2016 Tony joined Qwarie (www.qwarie.com) as their head of training to build on what he was doing previously but in a bigger company to offer OSINT research and training to more clients around the world.
Further details: http://www.privatehealthcareaustralia.org.au/fraud2016/speakers/
Chances are cyber crime is going to get worse before things get better as new technology develops and the hacker hunters fight back
Source: Is the future of cyber crime a nightmare scenario? – Raconteur
WINDOWS 10 has been criticised for its overly aggressive upgrade tactics, privacy concerns and lack of user choice, in a damning new report by the Electronic Frontier Foundation.
Source: Windows 10 collects an ‘unprecedented amount’ of data, claims EFF
Internet users believe the anniversary marks a quarter of a century since the webâ€™s inventor, Sir Tim Berners-Lee, made the service publicly available for the first time on 23 August 1991.
Source: The Internet’s 25th birthday sparks celebrations online
Users of Apple’s iPhone are being targeted by a new iTunes email scam demanding payment for a phoney Netflix subscription. Here’s how to protect yourself.
Source: iPhone users plagued by sinister Netflix email scam? Here’s how to protect yourself
Almost six million fraud and cyber crimes were committed last year in England and Wales, new figures from the Office for National Statistics suggest.
Source: Nearly six million fraud and cyber crimes last year, ONS says – BBC News
A cybercriminal has listed credentials for 200 million alleged Yahoo accounts for sale on the dark web. Yahoo has neither confirmed nor denied the claims, and users may want to reset passwords.
Source: Hacker claims 200m Yahoo accounts are listed on a dark web market | Daily Mail Online
KeySniffer tool enables hackers to sniff out passwords and other sensitive information
Source: Unencrypted wireless keyboards wide open to keystroke logging | TheINQUIRER
Symantec tells us that the average ransom demand is now Â£525, up from Â£223 at the end of last year.
Source: Ransomware demand doubles in half a year | ITProPortal.com
Do Macs get viruses? And do Macs need an antivirus? Mac OS X is inherently secure, but after various flaws and attacks in recent years – including the SSL bug/Gotofail error – Mac users are understandably concerned. Here are a handful of steps you can take to tighten up your Mac’s security
Source: Why you DO need antivirus software for your Mac (probably)
All companies are now vulnerable to cyber attacks, even those with a low public profile in industries not generally associated with cyber crime.
Source: UK firms failing on cyber security
MOBILE phone users can send a text message to opt out of nuisance calls from today.
Source: How to stop nuisance calls with one simple text message
Police are taking DDoS attacks seriously, as they are being used as a front to cover bigger assaults.
Source: Denial-of-service attacks now a cover for something more sinister | ZDNet
Report finds that criminals reaching same level of sophistication as nation state hackers
Source: Cyber-criminals becoming increasingly professional
Israel’s Cellebrite, a provider of mobile forensic software, is helping the U.S. Federal Bureau of Investigation’s attempt to unlock an iPhone used by one of the San Bernardino, California shooters, the Yedioth Ahronoth newspaper reported on Wednesday.
Source: Israeli firm helping FBI to open encrypted iPhone
Read this guide on IT support for charities for answers from our experts to real-world IT problems
Source: IT for Charities: A Guide – Cheeky Munkey
After nearly two years of planning, the new UK Government Security Classification system comes into operation this month. This will probably be accompanied by some articles from the doomsday brigadâ€¦
Source: UK Government Security Classification Scheme
Bitcoin has recently experienced another “stress test,” in form of a lot of transaction spam. Along with the continuous debate on whether or not to increase the Bitcoin block size, a lot of people have started looking at the potential outcomes of the situation.
Source: Alternative means of settling with bitcoin Â» Brave New Coin
The malware is thought to being used by Russian cybercriminals to gain access to Android devices, allowing them to take control of mobile phones, read text messages, make calls and wipe the devices.
Source: Beware the Android virus, Mazar, that can WIPE your phone
With 22 security bulletins thus far, Microsoft is on target to surpass 2015’s record of 135 bulletins.
Source: February Patch Tuesday plugs holes in Adobe Flash & Office
The most furious critique of Apple that I’ve seen in the past few days came in the form of an analogy: what if your bank detected fraud on your account, disabled your debit card and then permanently emptied your account to protect you against fraudulent use of that money? It would be monumentally unfair â€“ but that’s how many people have been reacting to the dreaded iPhone “Error 53” that has received so much publicity in recent days.
Source: iPhone’s Error 53: Apple is scolding us like an angry parent
If a mysterious error code called â€˜Error 53â€™ pops up on your iPhone, brace yourself. This message could mean imminent death for iPhones that have been repaired by third party services.
Source: Apple’s software update ‘Error 53’ could kill your iPhone 6 or 6 Plus
Buy The British Transport Police: An Illustrated History by Richard Stacpoole-Ryding. A great read.
Source: The British Transport Police: An Illustrated History
Shodan search engine is only the latest reminder of why we need to fix IoT security.
Source: â€œInternet of Thingsâ€ security is hilariously broken and getting worse
You likely use it multiple times a day, but is it safe and secure? From apps to email to accessing your bank online, here are some of the best ways to secu
Source: Smartphone Security Guidance
Internet security software firm SplashData has released its annual list of passwords of the worst and most common passwords that you absolutely must not
Source: These are the 25 internet passwords you must not use
Theresa May says new surveillance powers – unveiled under the Investigatory Powers Bill last month – will help police and spooks to track down and identify anonymous cyberbullies
Source: Theresa May says new spying powers will be used to bring online trolls to justice
Download our survey on the evolving threats of cybercrime. Crimes like car theft are declining, cybercrime is rising – how should the UK law enforcement should respond?
Source: Cybercrime tipping point
Digital learning toys always make a great holiday gift for children. Unfortunately for one company, VTech Holdings, Ltd., this season may not prove to be so successful after a security hack exposed millions of peoplesâ€™ information, including that of children. VTech, a digital learning toy-maker based in Hong Kong, claimed that the information of approximately [â€¦]
Source: VTech Hacked: 6.4 Million Children Exposed
Chancellor also announced support for cyber start-ups and skills development
Source: UK Gov will double cybersecurity funding to fend off ISIS cyber attacks
A DIGITAL security company has warned that 2015 is likely to become the biggest â€œCybercriminal Christmasâ€ so far, and it has told UK retailers that they need to be prepared for an increased level of attacks.
Source: Cyber crime attacks set to hit record levels
Cyber crime is “rampant” in Ireland, with gardai investigating up to 30 businesses targeted by offshore hackers and 100 cases of mostly older people who were tricked into disc
Source: Cyber crime ‘rampant against the elderly’
As Microsoft Windows turns 30, we take a look back at the history of the iconic operating system
Source: 30 moments to make you feel nostalgic about Microsoft Windows
The UKâ€™s MI5 and the Government Communications Headquarters (GCHQ) have revealed that according to their information-gathering activities, Britain faces around 70 sophisticated cyber-espionage operations per month against its government and industry networks.
Source: MI5 and GCHQ: Britain facing 70 advanced cyber attacks per month
TechUK report calls for technology industry and police to work closer together to tackle cybercrime
Source: Police Forces â€˜Need To Do Moreâ€™ To Tackle UK Cybercrime
One in five victims of cybercrime in the UK think that they were definitely targeted by fraudsters.
Source: 20 percent of UK cyber-crime victims feel fraudsters target them – SC Magazine UK
Inclusion of more than seven million cyber offences pushes British crime rate up 70 percent, ONS figures reveal
Source: Cybercrime Is Now Britainâ€™s Most Common Criminal Offence
From infected apps to tricky work device policies, mobile security is a prevalent issue, but individuals and businesses can take steps to protect their data
Source: How secure is your smartphone? | Media Network | The Guardian
Follow these 5 easy steps to increase your online privacy and protect your Instagram account from cyber-criminals.
Source: The Essential 5 Step Guide to Secure Your Instagram Account
All the inside News From the Dark Net Markets – Silk Road Drugs, Hidden Marketplace list, Memes And Harm Reduction Watch
Source: DeepDotWeb – Surfacing The News From The Deep Web
Security Tips from the BBC……
Windows Internet WatchDog is a new threat from the FakeVimes malware family. This Windows Internet WatchDogÂ threat is classified as virusÂ because it inflicts and acts as a malicious virus into yourâ€¦
Source: Remove “Windows Internet WatchDog” virus (Easy Removal Guide)