Click here to close now.

SYS-CON MEDIA Authors: Liz McMillan, AppDynamics Blog, David Sprott, tru welu, Blue Box Blog

News Feed Item

4talk Brings Bad News To Spammers

How much unwanted information must be spread to get a separate name in SPAM Encyclopedia? In 2003 alone 500 million phishy messages were reported and the number is growing ever since. You can only imagine how many unsolicited messages are reaching us.

VILNIUS, Lithuania, Aug. 25, 2014 /PRNewswire/ -- For the last twenty years most of our inboxes have been flooded with "friendly" letters from spammers, taking up to 70% of all email traffic globally. Even social networking and instant messaging platforms that stormed into our daily lives a decade ago, were no exception. Despite the effort most service providers have been putting into preventing users from receiving junk messages, SPAM is still an issue.

Business representatives who use instant messengers for fast and cheap means of communication are at the top of spammers target list. The information shared by them is highly sensitive - it literally can cost millions for businesses. Believing that 3rd parties will never access your data, these days, is far fetched. And, just like to the rest of the world, SPAM is annoying to business leaders as well. But it is not the case for Sergey Kravtsov, the CEO of 4talk Global, developer of a cloud messaging app. Despite his personal contact details widely available online, Sergey claims that he hasn't received a single unsolicited message since switching to 4talk. Can you imagine a year without SPAM?

Social networks and instant messaging services are one of the most effective and easiest ways to deliver SPAM, or so called SPIM - spam for instant messaging to unaware users. Attacking messaging platforms that have an open chat feature is a common practice among spammers because users can be easily searched and contacted. In most cases active chat users are barely 18. In 2013 in UK alone 91% of respondents aged 16 to 24 reported to have used instant messaging apps (source: statista.com). The danger lies in high probability of underaged kids receiving phishy links to inappropriate adult content while innocently chatting with friends about Bieber and Gomez' on-and-off relationship.

"When we started thinking about a new IM, safety was one of the most important aspects. Even I was already tired of receiving endless amounts of spam everyday. The solution eventually evolved into 4talk. It's an app that meets all IM requirements and is a real headache for spammers," says Sergey.

4talk IM service uses phone number for user registration and identification. Once set up, any devices can be bundled to the same account. Phone number as the main form of registration gives users full control over who is trustworthy enough to be on the contacts list. Connections are made only via personal invitation. Definitely no "xxx15" user can contact or send a message without a permission, which makes 4talk a very safe communication platform for digital audience.

In an unfortunate event when a device is lost any user would want to protect his personal information. It can simply be done with 4talk just by deactivating that device, so all conversation history along with the files would not be available on the lost device anymore. All files and late night chats are stored in the cloud so they are available on the remaining devices.

Sergey stresses that, "Safety is something we must think prior to fun stuff. It's not an option to have a SPAM attack and only then think of preventing repeated ones. We are pretty confident we have eliminated every security loophole at 4talk. However, we will keep on introducing new obstacles to prevent future malicious attacks so it's not the best news for spammers."

Photo(s):
http://www.prlog.org/12357507

SOURCE 4talk Global Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In her General Session at 15th Cloud Expo, Anne Plese, Senior Consultant, Cloud Product Marketing, at Verizon Enterprise, focused on finding the right mix of renting vs. buying Oracle capacity to scale to meet business demands, and offer validated Oracle database TCO models for Oracle development and testing environments. Anne Plese is a marketing and technology enthusiast/realist with over 19+ years in high tech. At Verizon Enterprise, she focuses on driving growth for the Verizon Cloud platfo...
Andi Mann has been serving as Conference Chair of the DevOps Summit since its inception. He is one of the world's recognized leaders in DevOps, and continues to be one of its most articulate advocates. Here are some recent thoughts of his in an interview we conducted in the run-up to the DevOps Summit to be held June 9-11 at the Javits Center in New York City. When did you first start thinking about DevOps and its potential impact on enterprise IT? Andi: I first started thinking about DevOps b...
The most often asked question post-DevOps introduction is: “How do I get started?” There’s plenty of information on why DevOps is valid and important, but many managers still struggle with simple basics for how to initiate a DevOps program in their business. They struggle with issues related to current organizational inertia, the lack of experience on Continuous Integration/Delivery, understanding where DevOps will affect revenue and budget, etc. In their session at DevOps Summit, JP Morgentha...
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
The speed of product development has increased massively in the past 10 years. At the same time our formal secure development and SDL methodologies have fallen behind. This forces product developers to choose between rapid release times and security. In his session at DevOps Summit, Michael Murray, Director of Cyber Security Consulting and Assessment at GE Healthcare, examined the problems and presented some solutions for moving security into the DevOps lifecycle to ensure that we get fast AND ...
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Database, which includes its own RESTful API. Trove was originally developed around MySQL, whose interfaces are significantly less complicated than those of the Postgres cloud database. In his session at 16th Cloud...
How does one bridge the gap between traditional enterprise storage infrastructures and the private, hybrid, and public cloud? In his session at 15th Cloud Expo, Dan Pollack, Chief Architect of Storage Operations at AOL Inc., examed the workload differences and required changes to reuse existing knowledge and components when building and using a cloud infrastructure. He also looked into the operational considerations, tool requirements, and behavioral changes required for private cloud storage s...
Software is eating the world. Companies that were not previously in the technology space now find themselves competing with Google and Amazon on speed of innovation. As the innovation cycle accelerates, companies must embrace rapid and constant change to both applications and their infrastructure, and find a way to deliver speed and agility of development without sacrificing reliability or efficiency of operations. In her Day 2 Keynote DevOps Summit, Victoria Livschitz, CEO of Qubell, discussed...
In their general session at 16th Cloud Expo, Michael Piccininni, Global Account Manager – Cloud SP at EMC Corporation, and Mike Dietze, Regional Director at Windstream Hosted Solutions, will review next generation cloud services, including the Windstream-EMC Tier Storage solutions, and discuss how to increase efficiencies, improve service delivery and enhance corporate cloud solution development. Speaker Bios Michael Piccininni is Global Account Manager – Cloud SP at EMC Corporation. He has b...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In this session, James Kirkland, Red Hat's Chief Architect for the ...
Working with Big Data is challenging, especially when decision makers depend on market insights and intelligence from your data but don't have quick access to it or find it unusable. In their session at 6th Big Data Expo, Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia; Zel Bianco, President, CEO and Co-Founder of Interactive Edge of Solgenia; and Ermanno Bonifazi, CEO & Founder at Solgenia, discussed how a revolutionary cloud-based BI along with mobile analytics is already c...
While there are hundreds of public and private cloud hosting providers to choose from, not all clouds are created equal. If you’re seeking to host enterprise-level mission-critical applications, where Cloud Security is a primary concern, WHOA.com is setting new standards for cloud hosting, and has established itself as a major contender in the marketplace. We are constantly seeking ways to innovate and leverage state-of-the-art technologies. In his session at 16th Cloud Expo, Mike Rivera, Seni...
Hardware will never be more valuable than on the day it hits your loading dock. Each day new servers are not deployed to production the business is losing money. While Moore's Law is typically cited to explain the exponential density growth of chips, a critical consequence of this is rapid depreciation of servers. The hardware for clustered systems (e.g., Hadoop, OpenStack) tends to be significant capital expenses. In his session at Big Data Expo, Mason Katz, CTO and co-founder of StackIQ, disc...
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...