Jump to content

In the News

– BloombergTV

Anatomy of a Hack: How the NY Times Was Hit

Mark Risher, CEO at Impermium, breaks down the hacking attack on the New York Times and the potential cybersecurity loopholes of new wearable technologies. He speaks on Bloomberg Television's "Bloomberg West."

– The New York Times

The Pentagon as Silicon Valley’s Incubator

SAN FRANCISCO — In the ranks of technology incubator programs, there is AngelPad here in San Francisco and Y Combinator about 40 miles south in Mountain View. And then there is the Pentagon.

– MIT Technology Review

Hacking Industrial Systems Turns Out to Be Easy

New research from Black Hat shows it’s possible to trick water and energy infrastructure to cause physical damage—and securing these systems remains painfully slow.

– Forbes

The App Economy: A Ticking Cybersecurity Timebomb

Is the App Economy the Next Target Sector for Cybercrime? Hackers like attacking targets that are either high profile or have massive quantities of sensitive data. Their attention is turning towards the App Economy very quickly and effectively.

– Mobiledia

Security 2.0: Cracking Down on Cyber-Crooks

Maybe you have a safe or lockbox at home, somewhere to keep your valuables. But how do you protect your digital data? Passwords have worked well, but the occasional phishing scheme from a Nigerian Prince can still slip through. E-mail filters try to stem the deluge of unwanted messages, but hackers are using sophisticated tactics to easily bypass our increasing levels of text- and e-mail-based verification.

– BizReport

Impermium: Consumers Waffling on Internet Security

Consumers aren't ignoring the headlines about online security breaches, but they also aren't taking full advantage of security options and protocols. That, according to new data out from Impermium, which finds that most Americans have had virus/malware (56%) or phishing (37%) attacks but fewer than 25% are using two factor authentication to keep their information private.

– CSO Online

More Than 50% of Consumers Say They've Been Victimized By Bad Apps

Two-factor authentication could bolster security, but many don't know what it is or resist using it. More than half of consumers have been victimized by malware or a computer virus and more than a third have been targeted by phishing emails.

 

– Infosecurity Magazine

Despite Security Fears, Most Americans Don't Use Two-Factor Authentication

The current state of cybersecurity has left U.S. internet users anxious about hacks and password theft. Yet despite constant victimization, a survey has revealed that the majority are not using two-factor authentication and are left without a widely accepted or deployed method of protection.

– TechZone360

Impermium Study Looks at Consumer Attitudes on Internet Security

Unfortunately, many if not most of us have been victims of a virus or malware problem. This is not just at work where talented IT professionals can help us, but also at home and when we are out and about. Help can be problematic in those cases, and such problems can render our ability to interact useless.

– Bloomberg TV

Tech Titans Push Back Against Data Demands

Mark Risher, former "spam czar" for Yahoo, discusses how tech titans are pushing back against the government's data demands and the risks of PRISM for Silicon Valley. He speaks with Jon Erlichman on Bloomberg Television's "Bloomberg West."

– Bloomberg TV

How Are Security Contractors Vetted and Hired?

Bloomberg Contributing Editor Richard Falkenrath and Imperium Co-Founder Mark Risher discuss government contracting for surveillance work with Emily Chang on Bloomberg Television's "Bloomberg West."

– USA Today

Why Two-Factor Authentication Isn't a Cure-All

Mark Risher, CEO and co-founder of digital fingerprinting vendor Impermium and former "spam czar" at Yahoo, outlines why two-factor authentication systems recently implemented by Twitter, Gmail and Dropbox shouldn't be viewed as silver bullets

– The Economist

Hiring Digital 007s

A new cyber-industrial complex is rising. Should you worry? “At Booz Allen, we’re shaping the future of cyber-security,” trumpets a recruiting message on the website of Booz Allen Hamilton, a consulting and technology firm. It is hard to argue with that blurb right now.

– Red Herring

Impermium Named Finalist to Red Herring's Top 100 Most Innovative Companies

The Red Herring editorial team selected the 2013 Top 100 most innovative companies from a pool of hundreds from across North America. The Top 100 are evaluated on both quantitative and qualitative criteria, such as financial performance, technology innovation, quality of management, execution of strategy, and integration into their respective industries.

 

Red Herring is a global media company which unites the world’s best high technology innovators, venture investors and business decision makers in a variety of forums: a leading innovation magazine, an online daily technology news service, technology newsletters and major events for technology leaders around the globe. Red Herring provides an insider’s access to the global innovation economy, featuring unparalleled insights on the emerging technologies driving the economy.

– IT Wire

Twitter Does Two-Step

Twitter has announced a new more secure login process, introducing a two-step verification system for its users. Called Login Verification, the new system gives Tweeters the choice of having a verification code sent to their mobile every time they log in to Twitter.

– Information Week

Twitter Two-Factor Security Combats Takeovers

Moving to combat months of high-profile account takeovers, Twitter Wednesday announced the implementation of a voluntary, two-step authentication system.

– Bloomberg TV

How Does Twitter's 2-Step Login Work?

Imperium CEO Mark Risher discusses two-step authentication for Twitter accounts with Emily Chang on Bloomberg Television's "Bloomberg West."

– NPR

As Its Influence Grows, Twitter Becomes A Hacking Target

In recent weeks, the Associated Press, NPR and the BBC have all had their Twitter accounts hijacked. Hacks of high-profile accounts have real-world consequences, and the security at Twitter is coming under increased scrutiny.

– Reuters

Analysis: Truth and Consequences - A Dilemma for Twitter and Its Users

For many, a single fake tweet from the Associated Press account that briefly roiled financial markets on Tuesday, driving the Dow Jones industrial average down about 145 points, vividly reaffirmed the fearsome, near-instantaneous power of the 140-character message.

– Bloomberg TV

AP Suspends Twitter Account After Hacking

The Associated Press, one of the world’s largest news agencies, said a hacking attack caused it to send out an erroneous Twitter post that sent markets down 1 percent in a matter of seconds. Impermium CEO Mark Risher discusses cybersecurity with Emily Chang on Bloomberg Television's "Bloomberg West."

– PC World

AP Twitter Hack Prompts Fresh Look at Cybersecurity Needs

Getting hacked on Twitter is fast becoming a rite of passage for big corporations, but Tuesday's attack on the Associated Press could be a tipping point and shows that social networks must do more to keep their users safe, security experts said.


– The Times of India

Meet the People Who Can Protect Your Email Account

Passwords, for the longest time, have been the first wave of defence for an account on the internet. But with so many web services being used, it's simply not possible to keep a new password for each account, and users tend to reuse the password. This poses security issues.

– Business 2 Community

Solving the Social Media Spam Conundrum

Here’s a fun fact for the day: according to Mark Risher, chief executive of anti-spam company Impermium, as many as 40 percent of active social media accounts have been flagged as spammers. In total, approximately 8 percent of status updates, tweets and other social content is counted as spam.

– IT ProPortal

The Danger of an Exposed Account Username

In each of the recent attacks on EvernoteFacebookTwitter and others, the companies involved were quick to point out that passwords remained secure. But user information has a life of its own, and the effects of an attack on an individual can be felt long after the attack is over.

– The New York Times

Web Site Investigated for Posting Private Data

WASHINGTON — Law enforcement officials said on Tuesday that they had opened an investigation into a Web site that posted the home addresses, Social Security numbers and other personal information for more than a dozen celebrities and politicians, including Vice President Joseph R. Biden Jr., Michelle Obama and Jay-Z.

– Sci-Tech Today

Porn Apps Pose Rising Risk to Mobile Users

Malicious mobile malware attacks are being tied to porn content, and experts say cybercriminals are getting savvier. The cybercriminals spreading corrupted links, via mobile porn content, appear to be after your phone number and list of contacts to sell to spammers, leading to friends receiving more spam on their mobile devices.

– Star Tribune

Twitter Hacking Puts Focus on Security for Brands

One day last month, the phones at the Vancouver headquarters of HootSuite, a social media management company, began to ring. Burger King’s Twitter account had just been hacked. The company’s logo had been replaced by a McDonald’s logo, and rogue announcements began to appear.

– Poynter.org

AFP Twitter Account Hacked

Agence France-Press’s @AFPPHOTO account was hacked Tuesday. “Any documents or images posted on this account after 17:45 [Central European Time] are NOT from AFP.” The account was “posting pro-Syrian government and anti-Obama tweets and images,” Nathan Ingraham writes in The Verge. The account is now suspended.

– Mobile Marketing Watch

Brands Beginning to Worry about Social Media Security

The world of social media received a rousing chuckle last week when “news” broke that McDonalds had acquired Burger King. Burger King, of course, wasn’t laughing. And neither were security analysts who believe that hacking is becoming so frequent and severe that more must be done to prevent an exodus from social media by brand titans that don’t want to tolerate that risk.

– The New York Times

Twitter Hackings Put Focus on Security for Brands

While most Americans were winding up their holiday weekends last Monday, the phones at the Vancouver headquarters of HootSuite, a social media management company, began to ring.

– The Wall Street Journal

CIOs Make Tough Calls on the Cost of Cyber Security

As the number and sophistication of hacker attacks on major corporations continues to increase, security is moving from a functional IT area, often below the paygrade of CIOs, to strategic importance at the highest levels of corporations.

– Business Insider

The 15 Most Important Security Startups Of 2013

Computer security is a difficult problem that attracts some of the brightest minds in the tech industry who build some of the most innovative products. We've assembled this list of the hottest, coolest security startups creating buzz for a number of reasons.

– Information Week

Don't Let Spam Sabotage Your Social Brand

Impermium and TeleSign are working together to fight social spam, a scourge that the companies say is affecting not only consumers who use social networks, but also the businesses who leverage social for marketing, sales, customer service and other purposes.

– TMCnet

TeleSign Partners with Impermium

TeleSign, a company that deals in Internet fraud prevention and intelligent authentication solutions, recently revealed that it has signed a partnership agreement with Impermium.

– Theatlantic

What Internet Trolls Thought of the Debate

On the one hand, Impermium found, interest in the candidates overall -- as befits this moment in the campaign cycle -- seemed piqued. Com...

– Indiawest

Career Moves: Who's Movin' On Up

Impermium, a Redwood City, Calif.-based cleaner of content on Web sites and social networks, has named Sameer Bhalotra COO. He resigned l...

– Here & Now

Presidential Polls Take Wild Ride

The latest presidential polls have left voters and pundits scratching their heads. A three-day Gallup tracking poll released Monday morning showed Mitt Romney and President Barack Obama were tied.

– SmartPlanet

Upstart | Mark Risher, Impermium

With spam delivered via social media and networks on the rise, the former Yahoo ! executive wants to make it easier for...

– San Jose Mercury News

On the move

The Redwood City cybersecurity company, which protects websites and social networks from spam and abuse, named Sameer Bhalotra as chief operating officer.

– Itworld

Social spam is taking over the Internet

Remember when the most onerous chore of the day was emptying your email inbox of all the Viagra, bogus home loan, and XXX spam? Nowadays ...

– VentureBeat

3 hot security startups to watch

Three security startups caught our eye at the RSA Conference here in San Francisco today. Impermium, Pindrop Security, and MokaFive all s...