What Are the Tools of Persuasion in Advertising?

SOURCE:  https://smallbusiness.chron.com/

Advertising is a communication strategy designed to convince consumers to buy a company’s products. Persuasive communication involves getting attention, generating interest, creating a desire for change and encouraging action. Advertising is important for driving revenue and profit growth. Small businesses can use persuasive advertising in one-on-one settings and through traditional media channels, including print, television and the Internet.


The repeated use of phrases and images can help people remember the advertising messages and even accept them as truthful. For example, a technology company could reinforce the message of productivity in its commercials and a retailer could emphasize that its products provide the best value. Catchy slogans are also useful because they can be easily incorporated into short commercials and Internet banner ads.


The repetition-break tool consists of two or three repetitive sequences followed by a break or a deviating event that is different from the other sequences. For example, a pharmaceutical ad could show repetitive sequences of virile men and women in different settings followed by a graphic of the drug. The repetition creates an expectation of what is to come and the break comes as a surprise, which captures attention and generates interest. At the annual conference of the Cognitive Science Society, University of Illinois at Urbana-Champaign professor Jeffrey Loewenstein and colleagues cited research experiments showing that television advertisements using the repetition-break tool are persuasive and lead to higher purchase intentions than other forms of advertising.



If done properly, humor is an effective persuasive tool. Ambiguity, puns and comedic situations can make an ad memorable. People tend to remember things that make them smile, possibly leading to a purchase decision. For example, people are likely to remember a soft drink ad that has sketches of adorable polar bears drinking soft drinks while sliding down a mountain. Humor is one part of advertising messages, which usually include substantive messages, such as social acceptance, old-age security and family relationships.


Shock advertising aims to grab the attention of the audience. Jarring images and shocking text may also generate free media coverage, increasing the effectiveness of the advertising campaign. Public awareness ads against smoking and drugs often use shocking images to convey important health and safety messages. However, shocks tend to lose value through repeated exposure because viewers may start ignoring the ads altogether.

Other Tools

Other persuasive advertising tools include romantic imagery, music, stereotypes and celebrity endorsements. Product placements in favorite television programs and movies may also have a persuasive effect.



Creepy ‘Geofence’ Finds Anyone Who Went Near a Crime Scene

Police increasingly ask Google and other tech firms for data about who was where, when. Two judges ruled the investigative tool invalid in a Chicago case.

source:  wired.com


IN 2018, 23-YEAR-OLD Jorge Molina was arrested and jailed for six days on suspicion of killing another man. Police in Avondale, Arizona, about 20 miles from Phoenix, held Molina for questioning. According to a police report, officers told him they knew “one hundred percent, without a doubt” his phone was at the scene of the crime, based on data from Google. In fact, Molina wasn’t there. He’d simply lent an old phone to the man police later arrested. The phone was still signed into his Google account.

The information about Molina’s phone came from a geofence warrant, a relatively new and increasingly popular investigative technique police use to track suspects’ locations. Traditionally, police identify a suspect, then issue a warrant to search the person’s home or belongings.

Continue reading “Creepy ‘Geofence’ Finds Anyone Who Went Near a Crime Scene”



source:  buguroo.com

Phishing is considered one of the most prolific cybercrimes affecting individuals, companies and large institutions. Basically, it consists of supplanting the identity of a person or a brand/company through different media based on new information technologies.

The objective is to trick the recipient of a phishing email into providing confidential information used subsequently to carry out a financial scam. The basis for this cybercrime is none other than the main problem posed by the internet: distinguishing the true from the false.

We can identify several types of Phishing, depending on the media:

  • Deceptive Phishing: The user receives an email in which the cybercriminal pretends to be a trusted company in order to obtain confidential information, usually banking information with which to steal money. Sometimes, the email includes a link that redirects to a malicious site. It can be a cloned page whose URL is almost identical to that of the legitimate site. This is the system par excellence because it allows the use of more elements to create the deception: text, images, data…
  • Smishing: The cybercriminal usually pretends to be a trusted company and sends an SMS informing the user that they have won a prize, or offering them some kind of advantageous service. The objective is to trick the user into clicking on a link or downloading software that will ultimately steal their information.
  • Vishing: The cybercriminal uses voice calls posing as a supplier, operator, a support center, a bank, etc. with the aim of collecting certain personal information with which to later create the scam.

The fight against this type of crime has begun and cybersecurity companies try to generate antiphishing systems with the aim of identifying those communications or websites that may be false.

For their part, cybercriminals try to innovate so that their emails, text messages or calls are increasingly credible for users and get through the filters created by these antiphishing systems.


Report details how North Korean and Russian cybercriminals are cooperating

source:  scmagazine.com

Several companies, media outlets and the U.S. government have accused North Korean state-sponsored hackers of purchasing access to pre-hacked servers from criminal groups. But the connections to specific criminal groups have been a little more tenuous.

Now a new meta-analysis of previous reports from Intel 471 establish a likely connection to TrickBot.

TrickBot, as well as Dridex and TA505, are groupings of attacks linked to different Russian-speaking cybercriminals who sell access to victims’ machines in criminal forums. The North Korean Lazarus Group, which supplements an economy ravaged by sanctions with cybercrime, is known to use a variety of vectors to find initial access.

“I was skeptical about any North Korea / Russian criminal group links before writing this,” said Intel 471 chief executive Mark Arena, who wrote the report. “When open-source reporting is based on one or two instances of TrickBot and Lazarus in the same server, it’s possible that they were two separate attacks.”

Arena read through the various reporting on the overlap between criminal groups and Lazarus, contacted the researchers for information not contained in the reports and solicited additional information from other researchers.

What he found was a very clear chain in the reports showing TrickBot infections leading to malware only used infrequently in Lazarus-type attacks, which appears to be developed by Lazarus using the group’s fairly distinctive code.

Public reporting was less sufficient. A purported connection to Dridex appeared to be a researcher conflating different criminal groups. And when Arena contacted a BAE researcher who had given a presentation proposing a connection between TA505 and Lazarus, that researcher said the presentation was only meant to be taken as a theory. However, in speaking with practitioners who hadn’t made their work public, other people had independent suspicions of a link between the two that no longer appears to be active.

Arena told SC Media that knowing there is a connection between different actors gives defenders a chance to investigate a potential second problem when the first one is found. He added that if North Korea is likely to purchase access from one actor, it is likely to be willing to purchase from others. The choice of vendors shouldn’t be seen as set in stone.

““I was skeptical about any North Korea / Russian criminal group links before writing this…”  –Mark Arena,

source: wired.com

GOOGLE MAPS IS used by more than a billion people every month. And those people send in more than 20 million suggested updates each day. Better directions for you, more data for Google.

There are reasons why so many people use Google Maps: It’s arguably the easiest mapping service to use and has the most up-to-date data available. But it wouldn’t be a Google product if it didn’t collect lots of data about you. This can be collected through the Maps app, but also the GPS location settings of the phone that’s always in your pocket. As a result, there’s a lot Google knows about your whereabouts.

The extent of what Google knows can be seen on your location timeline. All the little red dots shown on the map reveal where you’ve been and when. For me, it shows 461 places that I visited before I turned the location settings off at the start of 2019. (The most common: predictably, my home and WIRED’s London office.)

If you want to turn off location data you can do this through your Google account here. There are also options to auto-delete future location history every three or 18 months. This will stop Google from gathering data about your location when you’re not using its services.

You may also want to turn off web tracking and activity, as other Google services and products can gather information about your location. “Location data may be saved as part of activity on Search and Maps when your Web & App Activity setting is on, and included in your photos depending on your camera app settings,” the company says.

Location data is different from the other types of data Google gathers about you: Using mapping services without giving away your location is pretty difficult. There’s one thing you can do on your phone to limit how much data Google Maps gathers: limit when Google Maps can access your location. Through Android and iOS settings you can limit Maps’ ability to access your location to when the app is in use, rather than at all times.

A truly private maps service doesn’t really exist for every platform. But there are other options out there that don’t store and gather as much of your data or feed it back into a larger profile of you. Here are the alternatives you could consider, and we’ve highlighted where there may be potential privacy trade-offs you have to make.


OpenStreetMap is the Wikipedia of apps—it’s built by the people who use it and all the information is open data, meaning anyone can reuse the maps for anything. It’s kept up to date by people using GPS devices, aerial photography, and other free sources of information. If you go somewhere and the map isn’t correct, then you can create an account and suggest changes.

Continue reading “The Best Privacy-Friendly Alternatives to Google Maps”

source:  Fastcompany.com

As 2020’s experiment with working from home turns into something more permanent, gitlab—the world’s largest all-remote company—offers a glimpse of what’s ahead, for better or worse.

A group of employees at the tech firm is debating the merits of an inflatable kayak over Zoom.
“It’s definitely [for] calm waters,” says engineer Lien Van Den Steen, 
as Thursday afternoon sun streams through a window in her Ghent, Belgium, home. 

From his home in Minnesota, Timm Ideker, a regional sales director, drops a link into the chat for  a kayak that breaks into pieces for easy transportation. “I have some concerns that this just means it’s going to leak in seven places,” says Simon Mansfield, a member of GitLab’s sales team, in Cardiff, Wales..

For most employees, this sort of conversation would be a brief sidebar from work, but discussing  kayaks—and weekend plans and favorite board games—is the entire point of this call. Employees from any GitLab team (or time zone) log on to these recurring 30-minute Company Calls to replicate the casual conversations that happen naturally when coworkers share the same office.

Artemus Note:  If you REALLY want to see a GREAT media-rich article about what GitLab’s doing on this front, click here!  You won’t be sorry!!

Continue reading “Extremely Transparent & Incredibly Remote: GitLab and Remote Working”

source:  cnet.com

photo by Josh Sorensen for Pexels.com

Palmer Luckey rose to tech fame for inventing the Oculus Rift, a virtual reality headset that helped generate interest in the technology. Now he’s got a different type of tech product to show off: the Ghost 4 military drone.

Built by Luckey’s new company, called Anduril Industries, the two-meter aircraft can be carried in a backpack and is designed to withstand the sand, mud and seawater of military operations. Anduril, which announced the drone Thursday, said the Ghost 4 has a 100-minute flight time and can be autonomously or remotely piloted. It can carry cameras, radio-jamming systems or lasers to spotlight targets. And it can drop packages weighing as much as 35 pounds.

Onboard artificial intelligence algorithms have been tuned to identify and track people, missiles and battlefield equipment. One Ghost 4 drone can join with other Ghost 4 drones to form a data-sharing swarm to relay information back to Lattice, Anduril’s situation monitoring system.

Continue reading “Oculus Founder’s Ghost 4 Military Drones Use AI for Surveillance and Attack”

source: kottke.org (contributed by FAN Steve Jones)


Researchers have demonstrated that they can make a working 3D-printed copy of a key just by listening to how the key sounds when inserted into a lock. And you don’t need a fancy mic — a smartphone or smart doorbell will do nicely if you can get it close enough to the lock.

The next time you unlock your front door, it might be worth trying to insert your key as quietly as possible; researchers have discovered that the sound of your key being inserted into the lock gives attackers all they need to make a working copy of your front door key.It sounds unlikely, but security researchers say they have proven that the series of audible, metallic clicks made as a key penetrates a lock can now be deciphered by signal processing software to reveal the precise shape of the sequence of ridges on the key’s shaft. Knowing this (the actual cut of your key), a working copy of it can then be three-dimensionally (3D) printed.  The next time you unlock your front door, it might be worth trying to insert your key as quietly as possible; researchers have discovered that the sound of your key being inserted into the lock gives attackers all they need to make a working copy of your front door key.

It sounds unlikely, but security researchers say they have proven that the series of audible, metallic clicks made as a key penetrates a lock can now be deciphered by signal processing software to reveal the precise shape of the sequence of ridges on the key’s shaft. Knowing this (the actual cut of your key), a working copy of it can then be three-dimensionally (3D) printed.

How Soundarya Ramesh and her team accomplished this is a fascinating read.


Continue reading “Researchers Can Duplicate Keys from the Sounds They Make in Locks”