Zuckerberg takes heat for hoodie on IPO road show
Facebook is about a week away from a near $100-billion valuation outing on Wall Street and at least one Wall Streeter is complaining about Mark Zuckerberg’s attire for the IPO road show. Tags: Facebook Industry News more…Twitter resists subpoena to release user’s data without warrant
Twitter is contesting a court order requiring it to turn over private data on a user charged with disorderly conduct during the Occupy Wall Street protests in New York last year. read more more…CVE-2012-0158 Exploitation Seen in Various Global Campaigns
As mentioned in our previous post, the actors behind the targeted attack campaigns we’re monitoring updated, and still are updating, the tools of their trade to further their agenda and achieve exploitation. Using a fairly new vulnerability such as CVE-2012-0158, patched barely 2 weeks ago, may allow these attackers the window of opportunity to effectively infiltrate their […] more…Do IT Execs Make Too Much Money?
The contentious issue of executive compensation is back in the news following the vote Tuesday by Citigroup shareholders to oppose the pay packages for its CEO and other top execs. The class warriors at The New York Times seized on the opportunity to editorialize in their news pages about national “income inequality” and “outsized compensation,” […] more…Instagram Originally Asked For $2 Billion
Facebook raised a lot of eyebrows when it bought Instagram for $1 billion last week. But that’s actually a bargain compared with Instagram CEO Kevin Systrom’s original asking price of $2 billion. That spectacular number appears in Wall Street Journal, which this evening ran down the details of the intense negotiations between Systrom and Facebook CEO […] more…CVE-2012-0158 – Now Being Used in More Tibetan-Themed Targeted Attack Campaigns
Days after Microsoft released six bulletins, we now have just spotted a number of Trojanized RTF files circulating in-the-wild. The said files are exploiting CVE-2012-0158, which is included in MS12-027. That particular bulletin affects a number of Microsoft programs, particularly versions of MS Office, Visual FoxPro, Commerce Server, BizTalk Server, as well as SQL Server. We spotted […] more…FCC to Google – "We asked you nicely FIVE times, but now we are SERIOUS"
It looked as though Google had got away with its Street View WiFi data collection fiasco in the USA. Until last Friday, when the FCC issued a resounding-sounding Notice of Apparent Liability for Forfeiture against the search giant. more…FTC to Google – "We asked you nicely FIVE times, but now we are SERIOUS"
It looked as though Google had got away with its Street View WiFi data collection fiasco in the USA. Until last Friday, when the FTC issued a resounding-sounding Notice of Apparent Liability for Forfeiture against the search giant. more…Great Firewall hiccup? China loses Internet connectivity for an hour
Thursday Internet traffic dropped off substantially to and from China. Paul Mozur of the Wall Street Journal’s China Real Time blog tracked the outage as a data dropoff lasting from 11:00am to 1:00pm local time. The interruption spawned a host of possible explanations. These included the powerful 8.6 magnitude earthquake the day before off the […] more…How To Increase Website Conversions With Effective Security
Make no mistake: online security is on every shopper’s mind. Online shopping is already a major part of US retail sales culture, and cybercriminals have been quick to follow the money. Bogus online retailers have boomed in recent years, setting up fraudulent sites with Web addresses similar to legitimate eCommerce sites and exposing consumers to […] more…What developers can expect at Google I/O 2012
Since when does a vendor-sponsored developer conference sell out 5,500 seats in just 20 minutes? That’s what happened when tickets for Google I/O 2012 went on sale this week. It beat last year’s record of an hour, which had also raised eyebrows. One easy answer is that Google I/O sells out because of the swag. […] more…How to Protect Your Privacy From “Leaky” Apps
Back in 2010, The Wall Street Journal was already warning us about app developers’ lack of transparency with regard to their intentions. “An examination of 101 popular smartphone “apps”—games and other software applications for iPhone and Android phones—showed that 56 transmitted the phone’s unique device ID to other companies without users’ awareness or consent. Forty-seven […] more…HACTIVISM – BE ALERT BUT NOT ALARMED
Last year we decided to bite the bullet, max out the credit cards and take our kids to the US. We had such a fantastic time: Disneyworld and Harry Potter world in Orlando, the Smithsonian in Washington, Hollywood and the walking zombies in New York. Yes, walking zombies. We were in New York when the […] more…Trend Micro @ RSA 2012, Part 2
As I promised in my previous post, here are some of the important keynotes, talks, and panel discussions at RSA 2012: The opening keynote by RSA chairman, Art Coviello, entitled “Sustaining Trust in a Hyperconnected World,” highlighted the immensity and increasing rate of targeted attacks, including the one that befell RSA last year. He also […] more…Kelihos/Hlux botnet returns with new techniques
It has been four months since Microsoft and Kaspersky Lab announced the disruption of Kelihos/Hlux botnet. The sinkholing method that was used has its advantages – it is possible to disable a botnet rather quickly without taking control over the infrastructure.However,as this particular case showed, it is not very effective if the botnet’s masters are […] more…More information
- Effective IT security habits of highly secure companies
- Google Analyzes Effectiveness of Website Hack Notifications
- US, Taiwan Most Affected by Mevade Malware
- IoT Security Firm VDOO Raises $32 Million
- Windows 10 to get disposable sandboxes for dodgy apps
- Judge tosses evidence obtained by FBI malware planted on dark website
- Simplifying your architecture looks good on paper, but is it worth the effort?
- Twitter beefs up security – takes pointers from spies
- Microsoft Windows Kernel CVE-2013-3198 Local Privilege Escalation Vulnerability
- Iran Denies Being Hit by US Cyber Attack