Archive for RB

Is Cisco buying Twitter followers for CSO?

Is Cisco buying Twitter followers for CSO?Brad Reese at BradReese.com writes that it seems ailing network giant Cisco (CSCO) has bought Twitter followers for Chief Strategy Officer Padmasree Warrior. Mr. Reese asks if Cisco purposely violate the Twitter rules that forbid the purchasing of accounts to gain followers?

Cisco logoMr. Reese points to information from TwitterAudit which exposes Twitter fraud is reporting: Approximately half-a-million (509,426) of the Twitter followers of the network gear maker’s Chief Strategy Officer, Padmasree Warrior, are fake Twitter accounts.

Each audit takes a random sample of 5000 Twitter followers for a user and calculates a score for each follower. This score is based on number of tweets, date of the last tweet, and ratio of followers to friends. We use these scores to determine whether any given user is real or fake. Of course, this scoring method is not perfect but it is a good way to tell if someone with lots of followers is likely to have increased their follower count by inorganic, fraudulent, or dishonest means.

Padmasree Warrior TwitterAudit

Mr. Reese writes he ran the following Status People check on the 1.4 million Twitter followers of Cisco Chief Strategy Officer, Padmasree Warrior:

Padmasree Warrior TwitterAudit

The practice of buying Twitter followers to boost your reputation in an online network seems to be mainstream business, as any Google search on the topic will show. It has also been covered by the New York Times, “Buying Their Way to Twitter FameNetwork World, “Inside the real economy behind fake Twitter accounts” and even mentioned on NPR.

 

rb-
I signed up to follow the networking business’s CSO to see what competitive insights I could gain from the CSO. The tweets coming out of the Cisco Chief Strategy Officer was were often so pointless that they seemed to be coming from a 16-year-old and not a key business person in the IT world.

The tweets were so pointless I just ignored them, now I am going to expend the effort to actually unfollow Warrior …..

Done – So now Cisco you will have to buy another Twitter follower to follow pointless tweets for your business leaders – Now get back to making great network gear.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Patent Trolls After Foursquare and Buzzfeed

Patent Trolls After Foursquare and BuzzfeedNon-practicing entities continue to take it to young companies with a vengeance. Jeff John Roberts at GigaOM reports that a Nevada-based non-practicing entity (aka Patent troll) shell company that claims to own basic navigation technology wants Foursquare to pay up. The patent troll Silver State Intellectual Technologies Inc has filed a lawsuit in Las Vegas, seeking an injunction and damages related to U.S. Patent 7475057 (“System and method for user navigation”) and U.S. Patent 7343165 (“GPS Publication Application Server”), claiming the popular app is violating these two patents.

foursquareThe article says both patents describe the process of pushing information from a remote server to a user based on the location of that user and show diagrams. The Foursquare app relies on location tracking technology to offer a service that lets users and their friends “check-in” to restaurants, merchants, and other physical locations. Silver State’s short legal filing doesn’t describe how Foursquare infringed on the patent according to the blog.

Applications for the two Silver State patents were filed in 2000 and 2001 and were granted in 2008 and 2009. The article says the named inventor, Michael Obradovich, transferred the patents to a shell company shortly after he received the patents.

In another case, Mobile Transformation LLC a shell company is suing the popular viral news site BuzzFeed. The patent troll says its patent gives it the exclusive right to place certain ads in online videos. The non-practicing entity is suing BuzzFeed over the video “Romney vs Boris.” Mr. Johnson at GigaOM says the patent troll claims the video violates its technology by showing a static ad at the same time the video is streaming.

BuzzfeedThe shell company’s suit is reportedly relying on US Patent 6,351,736 which was issued in 2002 and covers a “system and method for displaying advertisements with played data.” The “method” described in the patent refers to the idea of showing a visual ad while music is playing explains GigaOM.

The BuzzFeed video, which shows London mayor Boris Johnson slamming Presidential candidate Mitt Romney, is not an audio clip. Mobile Transformation LCC claims, however, that it violates the patent because it uses an “embedded flash player to present a first data type of a video file of “Boris v Romney” along with the presentation of advertising data of a second type that includes a static image advertisement.” Records show the patent passed through a chain of shell companies before it became the basis of the current troll suit.

The author points out that the lawsuit comes at a time when so-called patent trolls like Silver State and Mobile Transformation LLC  have become aggressive about suing promising young companies. In addition to Foursquare and BuzzFeed, Etsy and Hipmunk were “mugged on payday” when they were hit with patent suits. This is the second time Foursquare has been hit by a patent suit. GigaOM speculates that BuzzFeed is unlikely to roll over for the patent troll. Last year another shell company sued The website, which makes highly sharable content like “The 25 Happiest Animals in the World,” for allegedly infringing on a method for mobile shopping. Last year, BuzzFeed countered-sued copyright troll Righthaven.

According to GigaOM, patent trolling involves shell companies that don’t make anything but instead acquire patents to demand money from companies that do make things. The article says Mobile Transformation LLC has already sued 21 companies and settled with a dozen of them.

Since they have no tangible assets, the shell companies are not vulnerable to countersuits, meaning their victims often fold their cards and pay a licensing fee for the troll to go away and not risk the cost of a prolonged lawsuit even though recent research suggests doing so may be a mistake.

The shell company structure is advantageous to the patent holders because it’s typically impossible to tell who is collecting on the patent payouts and because their lack of assets or a real business makes them impervious to countersuits.

rb-

Buzzfeed is no longer a guilty pleasure, they are heroes for standing up against the patent troll business model.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

A History of Mac Malware: Part 1

A History of Mac Malware: Part 1Graham Cluley at Sophos recently wrote an excellent history of Apple Macintosh malware. He points out that Mac malware is a subject that raises strong emotions. There are some who believe that the problem is over-hyped and others who believe that the malware problem on Macs is underestimated by the Apple-loving community. The author writes that hopefully, this short history will go some way to present the facts and encourage sensible debate. (rb- We have just taken on a new customer which is 85% Mac and 15% PC. I have had this very conversation with my Apple certified tech who does the field support.)

Click here for part two of this series. Click here to read my recent series commemorating the 25th anniversary of the computer virus.

Apple II1982 – Apple II – The first virus to affect Apple computers wasn’t written for the Macintosh (the original Mac did appear until 1984). 15-year-old student Rich Skrenta wrote the Elk Cloner virus, capable of infecting the boot sector of Apple II computers. On every 50th boot the Elk Cloner virus would display a short poem:

It will get on all your disks
It will infiltrate your chips
Yes, it’s Cloner!

It will stick to you like glue
It will modify RAM too
Send in the Cloner!

The blog says many Apple fans are surprised that the Elk Cloner boot sector virus predates IBM (IBM) PC viruses by some years. (I got my first paying tech job using an Apple II and PFS:File to build a database).

1987 – Macintosh – The nVIR virus began to infect Apple Macintosh computers, spreading its malware mainly by floppy disk. It was a similar story to what was happening in the world of MS-DOS malware, where viruses would typically travel from computer to computer by users sharing floppy disks.

Source code for nVIR was later made available, causing a rash of variants for the Mac platform. The author writes that the first anti-virus products for Mac, some free, some commercial, began to emerge in response th this malware. (In my first tech support Job, I got very familiar with the Mac 30/SE, since there was a computer lab full of them with a SCSI chain from the Mac to an external hard drive to a scanner. They also printed to a LaserWriter 2 with AppleTalk and Phonenet. I still have a bag of terminators.)

Mac 30/SE1988 – HyperCard – Running on early versions of Apple’s Mac OS, one HyperCard virus displayed a message about Michael Dukakis’s US presidential bid before self-destructing:

Greetings from the HyperAvenger! I am the first HyperCard virus ever. I was created by a mischievous 14-year-old, and am completely harmless. Dukakis for preseident (sic) in ’88. Peace on earth and have a nice day

1990 – The MDEF virus (aka Garfield) emerged, spreading malware on application and system files on the Mac.

1991 – HC (also known as Two Tunes or Three Tunes) was a HyperCard virus discovered in Holland and Belgium in March 1991. The writes that on German language versions of the operating system it would play German folk tunes and display messages such as “Hey, what are you doing?” and “Don’t panic.”

Microsoft Office1995 – Concept Macro Virus – Microsoft (MSFT) accidentally shipped the first-ever Word macro virus, Concept, on CD-ROM. It infected both Macs and PCs running Microsoft Word. Concept was not written with malicious intent but thousands of macro viruses were to follow, many also affecting Microsoft Office for Mac. Word macro viruses turned the world of Mac *and* Windows malware on its head overnight according to Sophos.

Macro viruses are written in an easy-to-understand macro language that Microsoft included in its Office programs making it. The blog says the macro language made it child’s play to create new malware variants. Most people at the time considered documents to be non-dangerous and were happy to receive them without thinking about the security risks. Just opening a Word .DOC file could infect your computer because the macro virus’s code was embedded within.

1996 – Laroux  Excel macro virus – The Laroux virus did not affect Mac users until Microsoft released Excel 98 for Mac and then Apple users could also become victims.

QuickTime logo1998 – Hong Kong introduced the next significant Mac malware outbreak the blog says.  It was first spotted in the wild in Hong Kong. The worm – dubbed AutoStart 9805 – spread rapidly in the desktop publishing community via removable media, using the CD-ROM AutoPlay feature of QuickTime 2.5+. (rb- An AutoPlay issue – whoda thunkit?). In the same year, Sevendust, also known as 666, infected applications on Apple Mac computers.

After 1988 Mr. Cluely writes that big changes to the Mac malware scene were just around the corner. The release of Mac OS X, a whole new operating system which would mean that much of the old malware would no longer be capable of running. Mac-specific malware would have to be written with a new OS in mind.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Mars Rock Stars by HP

Mars Rock Stars by HPNow that big sister Curiosity has stolen all the thunder from the original NASA Mars Rovers Spirit and Opportunity. It is time to recall when they were the rock stars on Mars. They were so cool in the day that even stodgy HP (HPQ) had a commercial with the first Mars Rovers.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Privacy on IPv6 Networks

Privacy on IPv6 Networks

Internet service providers, websites, and equipment vendors around the globe took part in the World IPv6 launch in June, Internet companies including AT&T (T), Cisco (CSCO), Comcast (CMCSA), Facebook (FB), Google (GOOG), Microsoft (MSFT), Verizon Wireless (VZ), and Yahoo (YHOO) decided to permanently turn on IPv6. A small fraction of Internet users and devices have started communicating via IPv6 networks, with more and more transitioning to the new protocol over the coming months and years. There are security and privacy implications in the switch to IPv6.

IPv6All kinds of devices will get new IPv6 numbers as the addressing format grows. The IPv6 addresses for these networked devices can be generated in a number of different ways and the choice of how they are created has potentially wide-reaching effects for security and privacy Center for Democracy & Technology explains. One of the original methods for assigning new addresses involved using a unique device identifier (known as a MAC address) as the suffix of the IPv6 address. This method creates a permanent, unique address for a device, potentially allowing any server that the device communicates with to indefinitely track the user.

IPv6 designers soon realized the potential security and privacy problems of MAC-based addresses; as a result, they created an alternate method known as “privacy extensions” or “privacy addresses” the article reports. The privacy extensions use a randomly generated number instead of a MAC address. In order to protect privacy on an IPv6 network, the random number is unrelated to any device identifier and in practice lasts no more than a week (and often much less time), ensuring that the user’s IP address cannot be used for long-term user tracking.

SmartphoneIt is up to operating system vendors to choose which IP address assignment method will be the default on their devices. The author says that some vendors have made good choices, particularly within the last year. Microsoft has long led the charge on IPv6 privacy, with privacy extensions on by default in all versions of Microsoft Windows since the release of Windows XP nearly a decade ago. Apple followed suit last year, with privacy extensions activated by default in all versions of Mac OS X since 10.7 (Lion) and with the release of iOS 4.3 for iPhone and iPad. Google did likewise in its Android 4.0 release last year.

The CDT says that as long as Internet users choose to upgrade their operating systems to the latest versions, they should be protected against perpetual security and privacy threats from IPv6 network address tracking.

rb-

mobile OS's send private information about their users to the networHowever, I wrote about reports from H.Security that mobile operating systems do not protect security or privacy on IPv6 networks. The report says mobile OSs send private information about their users to the network. The H.Security article says this is not a flaw in IPv6, rather it is lazy programming in some cases. The article points out that neither Apple’s iOS nor Android devices have the option to enable Privacy Extensions or the option to disable IPv6. apparently, the only thing smartphones need is a control option in the user interface to protect mobile OS users’ privacy and security on an IPv6 network.

Related articles
  • Romania Has the Fastest IPv6 Adoption Rate (maindevice.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.