Feeds

HP's snowballing shame

Buggin' hell

Top three mobile application threats

And the hits just keep on coming. The latest embarrassments for HP include claims of bugging its own chief executive, attempting to install a trojan on a reporter's computer, and the forthcoming spectacle of their ousted chairwoman hauled before a congressional committee.

Patricia Dunn, who was allowed to quietly shuffle away from the chair by the rest of the HP board, will appear before the House Committee on Energy and Commerce in hearings beginning September 28.

The committee will vote today on whether to assume powers to fast-track subpoenas to squeeze HP for information. So far HP's submissions on the reporter scandal have been voluntary.

Like the Californian Attorney General and FBI, Congress' interest has been piqued by allegations of "pretexting" - where private investigators illegally obtain phone records under false pretenses.

The New York Times reports one of the CNET reporters targeted by HP's goons also received a document from them via email with an embedded trojan. The spying program failed to install itself correctly however.

And in yet another twist, The San Jose Mercury reports Carly Fiorina, predecessor as chairman, CEO and president, to the recently promoted Mark Hurd, was spied on by her own investigation. Fiorina, eager to trace the source of leaks, launched the orignal bugging operation in 2005.

HP's crisis management PR machine is struggling with the snowballing scandal. Spokesman Ryan Donovan said Monday: "The only thing I would say about the current investigation is the intent was the right intent. Information was leaked from the company that was potentially damaging and had ability to move stocks, which is not a good thing."

Call us naïve, Ryan, but we reckon investors prefer the movement of stock to be based on information rather than no information, damaging or not. In fact - hold the phone - isn't that how a market economy is supposed to work? ®

3 Big data security analytics techniques

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.