Latest

Peugeot sends mobile ads you can feel to the UK

The company has now released vibrating advertisements meant to simulate the sensation of driving.

Peugeot has now sent a new mobile ads strategy into the United Kingdom, claiming to be the first company to put haptic technology into use with the launch of a video that uses immersive tech.

The smartphone video has been designed to capture a more complete impression of the driving experience.

The mobile ads based on this video use touch technology to be able to simulate the feeling of the experience of driving a car, through the display of a viewer’s smartphone. The pop up advertisement appears within an app window and demonstrates a short video of a trip in the vehicle. The advertising has been equipped with effects using vibrations that are triggered at the same time as the car accelerates or revs up its engine.

This mobile ads strategy was created in partnership with Peugeot’s media agency, OMD, and Opera Mediaworks UK.

Mobile Ads - Simulate sensation of driving carOpera Mediaworks UK is a firm with a specialty in mobile advertising. The mobile marketing campaign itself is powered by Touchsense Engage, which is a form of haptic technology that was created by Immersion, a tech developer.

This particular mobile video ad is a component of the UK campaign from OMD for the Peugeot 308 GTi, which was first launched in October. Its initial launch was paired with a BETC Paris online video.

These high tech mobile ads featuring the vibrating video will be available exclusively to users of Android devices. The ad campaign will be run over mobile marketing channels throughout the length of December. It will be featured on apps that were selected by Opera Mediaworks. That said, another version of the video is also being made available for mobile device users to view on the Content Portal app from Immersion, which is available for download at Google Play. It will be interesting to see whether this tech will be seen as something beyond a gimmick and if it will expand in use by other brands and marketers, as well or if it will be a simple novelty that will draw interest for now, but that will fade as the latest fad.

Mobile security concerns exist in parking meter apps

A recent investigation from NCC Group has revealed that these applications are vulnerable to being hacked.

Researchers from NCC Group have now completed an investigation that has revealed that there could be greater mobile security concerns associated with parking meter apps than most users likely realize.

The researchers explained that many of these mobile apps are open to cyber attacks from hackers.

Companies using mobile apps to allow people to pay for their parking in the United Kingdom have been doing so in order to offer additional convenience through this alternative method. However, according to this research, the people who are using these apps may also be increasing their risk of mobile security problems. This typically affects people who have smartphones based on the Apple and Android operating systems.

It was the mobile security of the Android applications that underwent the majority of the investigation by NCC.

Mobile Security - Image of parking metersThe researchers looked into the various kinds of security vulnerabilities that can impact these specific kinds of mobile apps. They wanted to look into those applications as a whole opposed to examining individual apps and labeling them as somehow different than the rest. Therefore, they did not name the specific apps that were studied in the report. Instead, they published their results in general with regards to the paid parking apps in general.

The assessment of the security of these apps was focused on the amount of attack surface that was available on Android based smartphones, including the vendor’s APK and any data that would be stored on the mobile device because of the interactions with the online support servers. At the same time, throughout this research, there was no time at which investigations were made into problems that could result from manipulating data sent to the server. Therefore, this research did not represent the same level of results that would have been achieved if the apps had undergone thorough penetration testing.

The mobile security conclusion of the team at NCC was that almost all the applications they investigated had been “affected by security vulnerabilities – some more serious than others.” They pointed out that their cryptographic implementation mediocrity was among the most common trends from one to the next.