Enter a search term such as “mobile analytics” or browse our content using the filters above.
Check your spelling or try broadening your search.
Sorry about this, there is a problem with our search at the moment.
Please try again later.
Data is the lifeblood of the digital economy and represents one of the most valuable assets a company can develop today.
But according to leading security expert Bruce Schneier, "data is a toxic asset and saving it is dangerous."
Why? Saving data is dangerous because lots of people – including those with nefarious intentions – want it, it's hard to secure, and once it falls into the wrong hands, the damage can be significant.
Ashley Madison, which proudly bills itself as "the most famous name in infidelity and married dating" is at the center of what might become one of the most talked-about hacking incidents ever.
The hack and subsequent release of the identities and personal information of tens of millions of people seeking extramarital affairs online has brought embarrassment to outed celebrities and politicians, and is already being blamed for at least two suicides.
"It is time for Adobe to announce the end-of-life date for Flash and to ask the browsers to set killbits on the same day."
The latest update to our Internet Statistics Compendium contains another comprehensive collection of key data from across the digital landscape, including primary research from ourselves and partners, as well as third party trends from a wealth of sources.
What makes an excellent checkout process on an ecommerce site?
Here, with the help of suggestions from Twitter, I've compiled a list of 11 checkouts which constitute examples of best practice in this area.
Third party trust logos are used on most ecommerce sites, with the intention of reassuring potential customers that they can shop safely with the retailer in question.
There are a lot to choose from, and a recent Baynard has looked into which logos are most trusted by US shoppers.
In this post, I'll take a look at the test and the results, as well as whether we need trustmarks on ecommerce sites at all...
This month the latest edition of our Internet Statistics Compendium includes the usual updates across its 12 data documents – including mobile, ecommerce, online advertising and all areas of digital marketing.
Microsoft recently announced its newly branded Lab of Things. It describes this as ‘a flexible platform for experimental research that uses connected devices in homes.’
I thought I’d use this opportunity to look again at the rise of the connected device, and the future of the so-called internet of things, or IoT. Below you’ll see 10 things that you, the consumer, should expect over the next few years.
We’ve seen a number of research projects and studies which show that mobile traffic and search volumes are likely to overtake desktop in the next 12 months, however the same can’t be said for sales and conversions through mobile devices.
Instead consumers are increasingly using smartphones for research and price checking, before ultimately making a purchase on desktop or tablet.
We investigated the reasons behind this disparity as part of our new Mobile Commerce Compendium, with the data showing that two-thirds (64%) of smartphone owners who don’t use mobile commerce simply prefer shopping online using a desktop or tablet.
The second most-common reason proved to be difficulties with the small screen size (41%), while 39% said they are concerned about security on their phone.
My iPhone is the least valuable thing I carry. But I didn’t realise that until my iPhone was stolen (pick-pocketed in Barcelona).
The thief didn’t get my keys, passport or wallet. If he had taken any of those items then I would have been unable to start my car, unable to leave Spain, or unable to pay my hotel bill.
Instead, he stole my iPhone4, which basically meant I couldn’t call, email or tweet. Within three days of the theft I was using a replacement iPhone5 (free upgrade from O2), and all my family photos & apps were restored from an iTunes back-up.
The ICO's cookie law has been, for many companies, a major headache. After being given an extra year to find compliance solutions -- an acknowledgment that complying wouldn't necessarily be painless -- companies were finally forced to implement them.
Those that don't could find themselves facing steep fines, and in an effort to show that it's serious about enforcement, the ICO earlier this year indicated that it would be contacting 50 high-traffic UK websites about their compliance.
UK retailer Tesco came under fire earlier this week for website security practices that may be leaving customer data vulnerable to hackers.
The incident started when software architect Troy Hunt noticed a tweet indicating that Tesco must be storing customer passwords in a manner that doesn't adhere to best practices because the retail giant emails customers their passwords in plain text.