Connect with us

Biz & IT

India’s Times Internet isn’t ceding ground to US rivals Facebook and Google

Published

on

The aggressive push by Silicon Valley companies and Chinese firms to win India, one of the last great growth markets, has decimated many local businesses in recent years. With each passing day, Amazon is closing in on Walmart-owned Flipkart’s lead on the e-commerce space. Uber is fighting with Ola for the tentpole position of the ride-hailing market; and Google and Facebook dominate the ads business, to name a few. But a handful of companies in India have not only survived the growing competition, but they have built businesses that are positively thriving.

Media conglomerate Times Internet, one such company, says that its properties now reach 110 million users each day and 450 million unique users each month. To put this in context: Facebook and Google have about 300 million monthly active users in India. Facebook, which is mired in controversy over the spread of misinformation on WhatsApp in India (and other regions), has not revealed its growth in the nation in last two years. But in a marketing pitch, the juggernaut says its family of apps (marquee Facebook, WhatsApp, and Instagram) reach 350 million users in the nation each month.

In a rare industry move, Satyan Gajwani, vice chairman of Times Internet, shared an overview of the conglomerate’s business on Tuesday, revealing the ever growing tentacles of its ambitions.

If the numbers are so huge, why self-publish? Gajwani declined to comment but his company is in a unique situation. For all its scale, Times Internet remains one of the least talked about conglomerates of its size in the country. Most news organizations in India compete with its media outlets, which may explain why it is under-reported in the press.

The ever-growing portfolio of Times Internet companies

The subsidiary of 181-year-old Bennett Coleman and Company Limited (popularly known as Times Group) operates more than three dozen properties, including newspaper Times of India, online outlet Indiatimes, advertisement business Colombia, venture arm Tventures, and streaming services Gaana and MX Player . And nearly all of these properties are growing, Gajwani said.

For instance, Times Internet’s news outlets have amassed 265 million monthly active users. The Times of India, the country’s most read newspaper and news website, alone has 212 million monthly active users, up by 44% since last year. Times Internet’s regional digital periodicals such as NewsPoint, Navbharat Times, Maharashtra Times, Vijay Karnataka now have 122 monthly active users, he said.

Music streaming service Gaana, which raised $115 million from Tencent and others last year, reached 100 monthly active users in March this year, the service announced last week. MX Player, a video playback app that doubles as a streaming service that Times Internet acquired for some $140 million last year, is one of the most popular Android apps in emerging markets.

During the first month of ongoing IPL cricket tournament, one of the hottest events in India, 118 million users tuned into Times Internet’s Cricbuzz, a news and entertainment service dedicated to sports. As the ecosystem of mobile gaming begins to gain major traction in India, Times Internet says it is building a portfolio of apps in this space, too.

Its lifestyle properties such as MensXP, iDiva, and Whats Hot have 40 million monthly active users and its videos clock more than 200 million views each month. These properties are exploring an additional revenue channel by selling products directly to customers, Gajwani told TechCrunch in an interview.

Times Internet vice chairman Satyan Gajwani

Moving beyond ads

Chasing that avenue illustrates Times Internet’s growing push to grow its business beyond ads. Most of Times Internet’s properties are built on top of ads and don’t cost users anything for access. Its own advertising business, called Colombia, now supplements some advertisement on its network and is used by more than a dozen outside brands including Ola, ABP News, and Hotstar.

But online advertising still can’t compete with those of TV and print in India, Satish Meena, an analyst with research firm Forrester told TechCrunch. So in recent years, Times Internet has announced a number of subscription services across many of its properties.

“Especially for premium publishers, an ads-only business model is not likely to last or sustain in the long run,” Gajwani said. Last year, Times Internet announced Times Prime, a subscription bundle that includes access to premium version of Gaana, an ad-free experience on Times of India, and discounts on a number of third-party services such as food delivery Swiggy, retailer BigBasket, and theatre chain PVR Cinemas. Gajwani said Times Internet has hit a million customers across its subscription services.

Part of Times Internet’s push to expand its revenue channels is its growing focus on Tventures, its VC fund that made early investments in a number of startups including edtech startup Byju’s and logistics startup Delhivery, two unicorns. It has also invested in ride-hailing service Shuttl, and cricket fantasy app MPL among others.

Gajwani said Tventures looks at “use cases that can benefit from its growing network.” And that’s one of the big advantages of Times Internet’s scale. The properties they own enjoy great advertisement benefits across its sprawling network. “There are very few companies — with exception of Google and Facebook — that have our level of scale,” Gajwani said.

Times Internet, which employs over 5,000 people, also operates Times Bridge, an investment firm that ties with international brands to help them launch in India. Some of its strategic partners include Uber, Airbnb, and Coursera. It also partnered with a number of news outlets including Business Insider, TechRadar, Huffington Post (which, like TechCrunch, is owned by Verizon Media Group), AdAge, PCMag, and Gizmodo Media properties Lifehacker and Gizmodo to launch them in India.

But it isn’t all success, there have been less successful ventures particularly in the media segment.

The Indian versions of Lifehacker, Gizmodo, TechRadar, and PCMag failed to attract significant audiences in the nation and have already closed shops. Huffington Post ended its partnership with Times Internet in 2017 and it now wholly controls Huffington Post India.

Gajwani admitted that Times Internet realized working with some niche publishers isn’t so sustainable. “We have some partnerships that we maintain that are doing well such as Business Insider,” he added. Today, Times Internet is no longer primarily looking at publishers for future partnerships, and instead focusing on “platforms and technologies.”

A couple of hiccups aside, the biggest challenge for Times Internet going forward is generating sufficient revenue from ads and convincing enough users to become paying customers. Times Internet generated $202 million in fiscal year 2018 at a loss of $23 million, according to regulatory filings. In an interview last week, Gaana CEO Prashan Agarwal said his music streaming service, which dominates the market but is not profitable, will introduce a number of premium plans across a wide range of price tiers to attract users.

Gajwani said he also hopes to build Colombia into one of the biggest ad networks in India and tap 20 million paying subscribers by 2023. He said some properties within Times Network could raise additional cash from outside investors in the coming future.  These are ambitious goals, but Times Internet is one of the few firms in India that realistically has a shot at co-existing with dominant overseas tech platforms.

Source link



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Biz & IT

US government strikes back at Kremlin for SolarWinds hack campaign

Published

on

Matt Anderson Photography/Getty Images

US officials on Thursday formally blamed Russia for backing one of the worst espionage hacks in recent US history and imposed sanctions designed to mete out punishments for that and other recent actions.

In a joint advisory, the National Security Agency, FBI, and Cybersecurity and Information Security Agency said that Russia’s Foreign Intelligence Service, abbreviated as the SVR, carried out the supply-chain attack on customers of the network management software from Austin, Texas-based SolarWinds.

The operation infected SolarWinds’ software build and distribution system and used it to push backdoored updates to about 18,000 customers. The hackers then sent follow-up payloads to about 10 US federal agencies and about 100 private organizations. Besides the SolarWinds supply-chain attack, the hackers also used password guessing and other techniques to breach networks.

After the massive operation came to light, Microsoft President Brad Smith called it an “act of recklessness.” In a call with reporters on Thursday, NSA Director of Cybersecurity Rob Joyce echoed the assessment that the operation went beyond established norms for government spying.

“We observed absolutely espionage,” Joyce said. “But what is concerning is from that platform, from the broad scale of availability of the access they achieved, there’s the opportunity to do other things, and that’s something we can’t tolerate and that’s why the US government is imposing costs and pushing back on these activities.”

Thursday’s joint advisory said that the SVR-backed hackers are behind other recent campaigns targeting COVID-19 research facilities, both by infecting them with malware known as both WellMess and WellMail and by exploiting a critical vulnerability in VMware software.

The advisory went on to say that the Russian intelligence service is continuing its campaign, in part by targeting networks that have yet to patch one of the five following critical vulnerabilities. Including the VMware flaw, they are:

  • CVE-2018-13379 Fortinet FortiGate VPN
  • CVE-2019-9670 Synacor Zimbra Collaboration Suite
  • CVE-2019-11510 Pulse Secure Pulse Connect Secure VPN
  • CVE-2019-19781 Citrix Application Delivery Controller and Gateway
  • CVE-2020-4006 VMware Workspace ONE Access

“Mitigation against these vulnerabilities is critically important as US and allied networks are constantly scanned, targeted, and exploited by Russian state-sponsored cyber actors,” the advisory stated. It went on to say that the “NSA, CISA, and FBI strongly encourage all cybersecurity stakeholders to check their networks for indicators of compromise related to all five vulnerabilities and the techniques detailed in the advisory and to urgently implement associated mitigations.”

CISA

The US Treasury Department, meanwhile, imposed sanctions to retaliate for what it said were “aggressive and harmful activities by the Government of the Russian Federation.” The measures include new prohibitions on Russian sovereign debt and sanctions on six Russia-based firms that the Treasury Department said “supported the Russian Intelligence Services’ efforts to carry out malicious cyber activities against the United States.”

The firms are:

  • ERA Technopolis, a research center operated by the Russian Ministry of Defense for transferring the personnel and expertise of the Russian technology sector to the development of technologies used by the country’s military. ERA Technopolis supports Russia’s Main Intelligence Directorate (GRU), a body responsible for offensive cyber and information operations.
  • Pasit, a Russia-based information technology company that has conducted research and development supporting malicious cyber operations by the SVR.
  • SVA, a Russian state-owned research institute specializing in advanced systems for information security located in that country. SVA has done research and development in support of the SVR’s malicious cyber operations.
  • Neobit, a Saint Petersburg, Russia-based IT security firm whose clients include the Russian Ministry of Defense, SVR, and Russia’s Federal Security Service. Neobit conducted research and development in support of the cyber operations conducted by the FSB, GRU, and SVR.
  • AST, a Russian IT security firm whose clients include the Russian Ministry of Defense, SVR, and FSB. AST provided technical support to cyber operations conducted by the FSB, GRU, and SVR.
  • Positive Technologies, a Russian IT security firm that supports Russian Government clients, including the FSB. Positive Technologies provides computer network security solutions to Russian businesses, foreign governments, and international companies and hosts recruiting events for the FSB and GRU.

“The reason they were called out is because they’re an integral part and participant in the operation that the SVR executes,” Joyce said of the six companies. “Our hope is that by denying the SVR the support of those companies, we’re impacting their ability to project some of this malicious activity around the world and especially into the US.”

Russian government officials have steadfastly denied any involvement in the SolarWinds campaign.

Besides attributing the SolarWinds campaign to the Russian government, Thursday’s release from the Treasury Department also said that the SVR was behind the August 2020 poisoning of Russian opposition leader Aleksey Navalny with a chemical weapon, the targeting of Russian journalists and others who openly criticize the Kremlin, and the theft of “red team tools,” which use exploits and other attack tools to mimic cyber attacks.

The “red team tools” reference was likely related to the offensive tools taken from FireEye, the security firm that first identified the Solar Winds campaign after discovering its network had been breached.
The Treasury department went on to say that the Russian government “cultivates and co-opts criminal hackers” to target US organizations. One group, known as Evil Corp. was sanctioned in 2019. That same year, federal prosecutors indicted the Evil Corp kingpin Maksim V. Yakubets and posted a $5 million bounty for information that leads to his arrest or conviction.

Although overshadowed by the sanctions and the formal attribution to Russia, the most important takeaway from Thursday’s announcements is that the SVR campaign remains ongoing and is currently leveraging the exploits mentioned above. Researchers said on Thursday that they’re seeing Internet scanning that is intended to identify servers that have yet to patch the Fortinet vulnerability, which the company fixed in 2019. Scanning for the other vulnerabilities is also likely ongoing.

People managing networks, particularly any that have yet to patch one of the five vulnerabilities, should read the latest CISA alert, which provides extensive technical details about the ongoing hacking campaign and ways to detect and mitigate compromises.

Continue Reading

Biz & IT

100 million more IoT devices are exposed—and they won’t be the last

Published

on

Elena Lacey

Over the last few years, researchers have found a shocking number of vulnerabilities in seemingly basic code that underpins how devices communicate with the Internet. Now, a new set of nine such vulnerabilities are exposing an estimated 100 million devices worldwide, including an array of Internet-of-things products and IT management servers. The larger question researchers are scrambling to answer, though, is how to spur substantive changes—and implement effective defenses—as more and more of these types of vulnerabilities pile up.

Dubbed Name:Wreck, the newly disclosed flaws are in four ubiquitous TCP/IP stacks, code that integrates network communication protocols to establish connections between devices and the Internet. The vulnerabilities, present in operating systems like the open source project FreeBSD, as well as Nucleus NET from the industrial control firm Siemens, all relate to how these stacks implement the “Domain Name System” Internet phone book. They all would allow an attacker to either crash a device and take it offline or gain control of it remotely. Both of these attacks could potentially wreak havoc in a network, especially in critical infrastructure, health care, or manufacturing settings where infiltrating a connected device or IT server can disrupt a whole system or serve as a valuable jumping-off point for burrowing deeper into a victim’s network.

All of the vulnerabilities, discovered by researchers at the security firms Forescout and JSOF, now have patches available, but that doesn’t necessarily translate to fixes in actual devices, which often run older software versions. Sometimes manufacturers haven’t created mechanisms to update this code, but in other situations they don’t manufacture the component it’s running on and simply don’t have control of the mechanism.

“With all these findings, I know it can seem like we’re just bringing problems to the table, but we’re really trying to raise awareness, work with the community, and figure out ways to address it,” says Elisa Costante, vice president of research at Forescout, which has done other, similar research through an effort it calls Project Memoria. “We’ve analyzed more than 15 TCP/IP stacks both proprietary and open source and we’ve found that there’s no real difference in quality. But these commonalities are also helpful, because we’ve found they have similar weak spots. When we analyze a new stack, we can go and look at these same places and share those common problems with other researchers as well as developers.”

The researchers haven’t seen evidence yet that attackers are actively exploiting these types of vulnerabilities in the wild. But with hundreds of millions—perhaps billions—of devices potentially impacted across numerous different findings, the exposure is significant.

Siemens USA chief cybersecurity officer Kurt John told Wired in a statement that the company “works closely with governments and industry partners to mitigate vulnerabilities … In this case we’re happy to have collaborated with one such partner, Forescout, to quickly identify and mitigate the vulnerability.”

The researchers coordinated disclosure of the flaws with developers releasing patches, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, and other vulnerability-tracking groups. Similar flaws found by Forescout and JSOF in other proprietary and open source TCP/IP stacks have already been found to expose hundreds of millions or even possibly billions of devices worldwide.

Issues show up so often in these ubiquitous network protocols because they’ve largely been passed down untouched through decades as the technology around them evolves. Essentially, since it ain’t broke, no one fixes it.

“For better or worse, these devices have code in them that people wrote 20 years ago—with the security mentality of 20 years ago,” says Ang Cui, CEO of the IoT security firm Red Balloon Security. “And it works; it never failed. But once you connect that to the Internet, it’s insecure. And that’s not that surprising, given that we’ve had to really rethink how we do security for general-purpose computers over those 20 years.”

The problem is notorious at this point, and it’s one that the security industry hasn’t been able to quash, because vulnerability-ridden zombie code always seems to reemerge.

“There are lots of examples of unintentionally recreating these low-level network bugs from the ’90s,” says Kenn White, co-director of the Open Crypto Audit Project. “A lot of it is about lack of economic incentives to really focus on the quality of this code.”

There’s some good news about the new slate of vulnerabilities the researchers found. Though the patches may not proliferate completely anytime soon, they are available. And other stopgap mitigations can reduce the exposure, namely keeping as many devices as possible from connecting directly to the Internet and using an internal DNS server to route data. Forescout’s Costante also notes that exploitation activity would be fairly predictable, making it easier to detect attempts to take advantage of these flaws.

When it comes to long-term solutions, there’s no quick fix given all the vendors, manufacturers, and developers who have a hand in these supply chains and products. But Forescout has released an open source script that network managers can use to identify potentially vulnerable IoT devices and servers in their environments. The company also maintains an open source library of database queries that researchers and developers can use to find similar DNS-related vulnerabilities more easily.

“It’s a widespread problem; it’s not just a problem for a specific kind of device,” Costante says. “And it’s not only cheap IoT devices. There’s more and more evidence of how widespread this is. That’s why we keep working to raise awareness.”

This story originally appeared on wired.com.

Continue Reading

Biz & IT

Microsoft acquires Nuance—makers of Dragon speech rec—for $16 billion

Published

on

Enlarge / In this 2011 photo, Dr. Michael A. Lee uses Dragon Medical voice-recognition software to enter his notes after seeing a patient.

Earlier today, Microsoft announced its plans to purchase Nuance for $56 per share—23 percent above Nuance’s closing price last Friday. The deal adds up to a $16 billion cash outlay and a total valuation for Nuance of about $19.7 billion, including that company’s assumed debt.

Who is Nuance?

In this 2006 photo, Rollie Berg—who has extremely limited use of his hands due to multiple sclerosis—uses Dragon NaturallySpeaking 8 to interact directly with his PC.
Enlarge / In this 2006 photo, Rollie Berg—who has extremely limited use of his hands due to multiple sclerosis—uses Dragon NaturallySpeaking 8 to interact directly with his PC.

Nuance is a well-known player in the field of natural language recognition. The company’s technology is the core of Apple’s Siri personal assistant. Nuance also sells well-known personal speech-recognition software Dragon NaturallySpeaking, which is invaluable to many people with a wide range of physical disabilities.

Dragon NaturallySpeaking, originally released in 1997, was one of the first commercially continuous dictation products—meaning software that did not require the user to pause briefly between words. In 2000, Dragon Systems was acquired by ScanSoft, which acquired Nuance Communications in 2005 and rebranded itself as Nuance.

Earlier versions of Dragon software used hidden Markov models to puzzle out the meaning of human speech, but this method had serious limitations compared to modern AI algorithms. In 2009, Stanford researcher Fei-Fei Li created ImageNet—a massive training data set that spawned a boom in deep-learning algorithms used for modern, core AI tech.

After Microsoft researchers Dong Yu and Frank Seide successfully applied deep-learning techniques to real-time automatic speech recognition in 2010, Dragon—now Nuance—applied the same techniques to its own speech-recognition software.

Fast forward to today, and—according to both Microsoft and Nuance—medically targeted versions of Dragon are in use by 77 percent of hospitals, 75 percent of radiologists, and 55 percent of physicians in the United States.

Microsoft’s acquisition play

Microsoft and Nuance began a partnership in 2019 to deliver ambient clinical intelligence (ACI) technologies to health care providers. ACI technology is intended to reduce physician burnout and increase efficiency by offloading administrative tasks onto computers. (A 2017 study published in the Annals of Family Medicine documented physicians typically spending two hours of record-keeping for every single hour of actual patient care.)

Acquiring Nuance gives Microsoft direct access to its entire health care customer list. It also gives Microsoft the opportunity to push Nuance technology—currently, mostly used in the US—to Microsoft’s own large international market. Nuance chief executive Mark Benjamin—who will continue to run Nuance as a Microsoft division after the acquisition—describes it as an opportunity to “superscale how we change an industry.”

The move doubles Microsoft’s total addressable market (TAM) in the health care vertical to nearly $500 billion. It also marries what Microsoft CEO Satya Nadella describes as “the AI layer at the healthcare point of delivery” with Microsoft’s own massive cloud infrastructure, including Azure, Teams, and Dynamics 365.

The acquisition has been unanimously approved by the Boards of Directors of both Nuance and Microsoft, and it is expected to close by the end of 2021.

Continue Reading

Trending