Tag Archives: request

Amazon, Comcast Content Delivery Network Push Could Hurt Akamai

Comcast ( CMCSA ) and Amazon Web Services, part of Amazon.com ( AMZN ), are becoming bigger players in the content delivery network market, posing a challenge to CDN leader Akamai Technologies ( AKAM ), according to Goldman Sachs. CDNs increase the speed of e-commerce transactions, business software downloads and video streaming to mobile devices. “Amazon is growing its Cloudfront CDN to an estimated $1.8 billion in 2016 revenues and shifting its own video delivery from independent CDNs to its own network, and startups like Fastly are growing share,” Goldman Sachs analyst Heather Bellini said in a research report. AWS is part of the e-commerce giant’s fast-growing cloud computing business. Amazon stock surged to an all-time high  on Tuesday, as the Wall Street Journal reported that Salesforce.com ( CRM ) was building a new service that uses AWS. AWS was a big reason Amazon reported its highest sales growth in nearly four years when it posted first-quarter earnings on April 28, sending the stock up nearly 10% the following day. Amazon is an IBD Leaderboard stock, with a strong IBD Composite Rating of 95, where 99 is highest. Akamai has a 59 CR. Bellini, who has a sell rating on Akamai stock, attended the 2016 Content Delivery Summit in New York on Monday, gaining views on market trends. “A key takeaway was that the competitive landscape remains intense, as Comcast looks to triple its CDN capacity next year,” wrote Bellini. Comcast, the No. 1 cable TV company, has been expanding commercial services to businesses. Comcast  moved into CDN services in late 2014, Bellini noted. One market trend could work in Comcast’s favor, said the Goldman Sachs analyst. “Multi-CDN deployments were a key theme of the conference,” she wrote, “with new startups making it easy to route traffic across multiple CDNs.” Cambridge, Mass.-based Akamai is the No. 1 provider of CDN services. Worries that big customers such as  Apple ( AAPL ) and  Facebook ( FB ) are shifting more of their data traffic to their own CDNs have pressured Akamai stock. Aside from AWS and Comcast, Akamai competes with  Level 3 Communications ( LVLT ),  Limelight Networks ( LLNW ), and Verizon Communications ( VZ ), as well as startups Fastly and CloudFlare.

Marketo Stock Leaps On Buyout Rumors

Marketo ( MKTO ) stock bolted higher Tuesday on a report that it is working with Morgan Stanley ( MS ) on a possible sale or other strategic alternatives. No deal is imminent and discussions with potential buyers may not result in a transaction, according an article from Bloomberg . Marketo’s software helps customers manage and track their email, social media and other marketing efforts. The company came public in May 2013 with shares priced at 13. Marketo stock rose 24.7% to 26.77 on the stock market today . The San Mateo, Calif.-based company reported first-quarter earnings on April 26. Revenue increased 35% year over year to $62.2 million, with a loss of 17 cents per share, minus items.

Viking Horde Malware Zombifies Phones Via Google Play: Check Point

The Walking Dead trope has nothing on the Viking Horde. On May 5, No. 1 cybersecurity firm Check Point Software Technology ( CHKP ) notified Alphabet ( GOOGL )-owned Google Play of an Android malware campaign that could affect 50,000 to 100,000 smartphones, researcher Jeff Zacuto told IBD on Tuesday. Coined Viking Horde, the malware stems from downloads of five Google Play apps — Viking Jump, Memory Booster, Parrot Copter, Simple 2048 and Wi-Fi Plus — uploaded to Google Play between March 29 and April 15. Late Tuesday, Memory Booster still turned up on a search of Google Play. Google didn’t respond to a request for more information. Together, the five malware-riddled apps have been downloaded 50,000 to 100,000 times, Zacuto said. The Viking Horde malware is completely transparent to the user, but adds the device to a growing botnet programmed to simulate ad clicks for revenue. “It just appears to be a harmless game on your device, but what was actually happening in the background was the malicious code was turning the devices into zombies,” he said. “It made them part of a botnet.” A botnet, or a zombie army of computers, is programmed to transmit data without a user’s knowledge. On a grand scheme, botnet campaigns are far more common to PCs, Zacuto said. The Viking Horde botnet takes advantage of clicks-for-revenue advertising. “I (a website owner) contact one of these groups and say, ‘Hey, could you do me a favor to do some fake ad-clicking for me and in exchange I’ll give you some of the revenue?’ ” Zacuto said. The majority of the downloads (44%) were out of Russia. Of the remainder, 10% were in Lebanon, and the U.S. and Mexico each accounted for 8% of the downloads. But there’s no way to quantify the number of infected devices. Beyond ad fraud, the Viking Horde malware is persistent, Zacuto said. Out of the box, most phones are unrooted, meaning the user can delete the infected app. But on rooted phones — where a user has more control — the malware installs additional components using sneaky names. “It will install components that have names that look like they’re supposed to be there,” he said. “On a rooted device, it can also install additional components that say, ‘Someone is trying to remove this app, let them remove it, but once that’s done reinstall it.’ ” Oftentimes, the app (and malware) will reinstall in a hidden place. Typical mobile anti-virus won’t detect the malware, Zacuto said. And most users won’t note the malware unless they recognize suspicious activity, such as the app’s request for access to root permissions. Furthermore, it can install a program that automatically downloads any malware updates to the app, leaving the door open for additional fraud, Zacuto said. On a rooted device, that means a user either has to buy an entirely new smartphone or perform a hard reset. “On the rooted device since you’ve opened up the ability to do anything on the device, you’re also giving the attacker the ability to do that as well,” he said. “They can steal information from your device, they can jam your data traffic, they can turn on the camera, the microphone.” He added: “They really have the ability to do anything they like.”