asterisk2a + apple + online   15

Aaron Levie (Box): The First $250m in ARR - YouTube
IPO growth-stage party round, Investors work understanding SAAS business, but do not understand it 110%. "Our growth is dependent on the level of investment (sales, marketing) we put into, we have no head ceiling. [...] Investors go, after explaining for 30 minutes, from IBM cash flow investors to a16z type doubling down [invest more in user acquisition due to lock-in and LTV for SAAS. [...] Box's disruption playbook via lots of layers/stacks (integrated, worry free) for enterprise; loss prevention, security, search, clouds storage, audit & compliance (ie HIPPA). [...] Marrying a frictionless consumer experience best practices (phablet, smart phone, tablet, desktop) with Enterprise 2.0/SAAS feature set, enabling lift of productivity and connectedness. Turning themselves into a strategic layer for Fortune 500 companies and ousting Oracle, IBM and MSFT (legacy infrastructure, see Sony hack). Box is pitching a modern architecture, not just cloud. [...] Building what customer asks for.
IPO  Box  Enterprise  2.0  SAAS  DropBox  Google  Drive  One  Drive  Microsoft  Google  Amazon  Cloud  Drive  Apple  iCloud  Spideroak  disruption  cyber  security  internet  security  IT  online  security  Salesforce  Aaron  Levie  Start-Up  lesson  Start-Up  advice 
april 2015 by asterisk2a
Apple iOS Hardware Assisted Screenlock Bruteforce | Hacker News
So it cuts power before the iPhone can store that a failed attempt occurred. It's such a simple, stupid, wonderful idea. I love it. Kudos to whoever came up with it.
Hacking  white  hat  hacker  black  hat  hacker  security  NSA  GCHQ  Five  Eyes  cyber  security  Privacy  Internet  Privacy  online  security  IT  Apple  password  security 
march 2015 by asterisk2a
Sure Stripe has more cash, but does it have a path to exit? | PandoDaily
The problem with raising capital at nosebleed valuations is that the number of scenarios under which a positive outcome is possible becomes greatly diminished. By raising at $3.5 billion, Stripe, [... and Investors ...] — are betting that the company can exit at or above $7 billion. That’s a steep price and largely eliminates acquisition as an option. The list of potential acquirers is likely limited to Facebook, Google, Apple, eBay, Amazon, and Alibaba in the tech sector. On the financial side, there are the large banks and credit card companies. But it’s hard to see anyone ponying up $7 billion to acquire Stripe, which has yet to prove that it has a sustainable business or attractive margins. [...] Not every round requires a doubling valuation, and in this case, it may turn out that everyone involved would be better if more modesty was applied. [...] [ Merger of Square & Stripe as worst case scenario? ] [ & IPOs to forget - Box, Groupon, Zynga, HortonWorks ... ]
Venture  Capital  Stripe  Apple  Pay  PayPal  Google  Wallet  Bitcoin  Amazon  Alibaba  Rakuten  Silicon  Valley  growth  round  exitstrategy  exit  strategy  IPO  M&A  business  model  margin  AliPay  Braintree  mobile  first  mobile  homescreen  Platform  network  effect  economies  of  scale  scaling  scale  Venmo  valuation  ycombinator  Unicorn  Square  Wall  Street  mobile  payments  online  payments  creditcard  Visa  Mastercard  payments  micropayments  Start-Up  lesson  Start-Up  advice 
december 2014 by asterisk2a
Men Blaming Jennifer Lawrence & Kate Upon for Nude Pics Leak, Hate NSA Spying - YouTube
http://techcrunch.com/video/samsung-gear-icloud-hacks-and-sarah-goes-to-burning-man/518402327/ - "Samsung Gear, iCloud Hacks And Sarah Goes To Burning Man - September 5, 2014" +++ !!! >>> http://betabeat.com/2014/09/spare-us-the-sanctimony-the-gross-hypocrisy-of-online-media-in-the-nude-photo-leak/ >> via http://www.reddit.com/r/TrueReddit/comments/2ffxoj/spare_us_the_sanctimony_the_gross_hypocrisy_of/ "No one complained about the release of Pam Anderson's wedding sex tape. No one complained about the relase of Scarlett Johansson's pics. People mocked Anthony Weiner, people mocked Hulk Hogan. I mean honestly, mocking? You are not offended for them? You are not hurt, you are really honestly mocking them? But if it suddenly happens to some one you happen to like then its awful and horrible and no good." +++ WORLD NEEDS MORE FEMALE HACKERS - youtu.be/UrsJHB8C36Q +++ wrd.cm/1q8LJiP +++ bit.ly/1wcMZSB +++ !!! bit.ly/1xqBDPb !!!
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  Celebrity  of  You  culture  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  slut  shaming  everyday  sexism  sexism  sexismus  sexualität  Intimate  relationship  hypocrisy  Daily  Mail  News  Corp.  Gawker  Tabloid 
september 2014 by asterisk2a
After celebrity nude leaks, Apple is finally taking security a little more seriously | PandoDaily
Now it seems that Apple is at least attempting to make its efforts to fix obvious security problems with its service a little easier to understand. I’m sure that has more to do with the allegations that it was responsible for the reprehensible leak of stolen nude photographs than with a new sense of responsibility to consumers, but we’ll have to take what we can get. Maybe the lesson will stick and the company will decide to be a little more forthcoming in the future. There is no reasonable expectation of perfect security in modern society, but we can at least strive for transparency from companies like Apple when our privacy is threatened. Better to know that something can’t be kept secure than to think it’s safe and remain ignorant of any threats.
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  The  Fappening  TheFappening  iCloud  rippers  Privacy  Internet  Privacy  DAU  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  Social  engineering  phishing  brute  force  attack  communication  PR  public  relations  language 
september 2014 by asterisk2a
Fappening: Lawrence, Dunst, Upton - Nacktbilder von Promis - SPIEGEL ONLINE
Schon wieder sind die Frauen schuld. Dabei erklärt sich die Tatsache, dass weniger Männer-Nacktbilder durch das Netz geistern, vermutlich nicht allein dadurch, dass die Herren der Sicherheit von Apple weniger vertraut haben und bessere Schutzsysteme hatten. Sondern durch die Tatsache, dass die nackten Männer kaum jemanden interessieren. Ein nackter Mann ist ein nackter Mann. Ein Bild von einer nackten Frau, das sie angreifbar macht, ist für viele ein Grund, sich daran aufzugeilen und einen Kommentar abzugeben. Und dann ist da noch die große Frage, die über der ganzen Debatte schwebt: Warum nehmen sich Menschen überhaupt nackt auf? Für viele eine klare Sache: Eitelkeit. Entsprechende Kommentare sind von Häme durchdrungen. Sie missachten, dass Frauen nicht zwangsläufig Nacktbilder aufnehmen, um einem Mann einen Gefallen zu tun. Für viele sind sie Ausdruck, dass ihr Körper, ihre Sexualität, ihnen gehört. Sie machen Aufnahmen von sich und für sich.
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  Celebrity  of  You  culture  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  slut  shaming  everyday  sexism  sexism  sexismus  sexualität  Intimate  relationship 
september 2014 by asterisk2a
A Letter To Jennifer Lawrence | TechCrunch
If I and other industry reporters like Mat Honan don’t know how exactly to absolutely protect ourselves, because the targets and tools are always changing, how will people who don’t have our exposure to tech? The onus is on Apple and other tech platforms like Google, Facebook, Amazon and Microsoft to keep their customers — us — safe. Though stolen photos are being shared that have been extracted from Android and Windows Phone backups, too, I’m singling out Apple here because Apple, beyond any other tech company, prides itself on a seamless consumer experience. It’s done a very good job of hiding the technical aspects of its products for the sake of user friendliness: “It just works.” Well, not in this case. +++ !!! http://www.huffingtonpost.com/2014/09/03/seth-green-huff-post_n_5761508.html + huff.to/WbN24c
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  Celebrity  of  You  culture  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  slut  shaming  everyday  sexism  sexism  sexismus 
september 2014 by asterisk2a
The Great Naked Celebrity Photo Leak of 2014 is just the beginning | Roxane Gay | Comment is free | theguardian.com
There will always be another leak, because there is always curiosity in the bodies of nude celebrity women. There is always danger in being an Other. [...] It goes without saying that there aren’t many nude photos of men being released. Men are largely free to bare their bodies as they choose without repercussion, unless, as is the case of Dave Franco with Allison Brie and Justin Verlander with Upton, the man happens to be in a picture with a young woman, collateral damage. [...] BREAKING: beneath their clothes, celebrities are naked. What these people are doing is reminding women that, no matter who they are, they are still women. They are forever vulnerable. [revenge porn, rules are different for girls, all happened without consent, it is a crime, like breaking in into someone's home & stealing personal belongings] + bit.ly/1sYcSTO + bbc.in/1qmjnkU "And it's not fair to blame the victims of crime who may have simply been following the instructions websites" + huff.to/Y9V13m
Celebrity  of  You  n00d  Celeb  Trading  Ring  culture  Celebgate  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  4chan  AnonIB  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  Apple  slut  shaming  everyday  sexism  sexism  sexismus 
september 2014 by asterisk2a
Notes on the Celebrity Data Theft | Hacker News
!!! - https://www.nikcub.com/posts/notes-on-the-celebrity-data-theft/ "In reviewing months worth of forum posts, image board posts, private emails, replies for requests for services, etc. nowhere was the FindMyPhone API brute force technique (revealed publicly and exploited in iBrute) mentioned. This doesn’t mean that it wasn’t used privately by the hackers – but judging by the skill levels involved, the mentions and tutorials around other techniques and some of the bragged about success rates with social engineering, recovery, resets, rats and phishing – it appears that such techniques were not necessary or never discovered. [...] Timestamps, forum posts and other data suggests that the collection was built up over a long period of time. [...] In terms of staying secure the most obvious solutions are to pick a better password, set your security answers to long random strings and enable two-factor authentication. [+] ring-fence your email [private & public & communication]."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers  DAU 
september 2014 by asterisk2a
Tone deaf Mt. Gox CEO Mark Karpeles warns the world about the dangers of hackers | PandoDaily
"Recent events show that with appropriate motivation anything can be hacked.Maybe everyone should stop and think about what it means for them" - Karpeles tweet would appear to be a reference to the recent celebrity hacking scandal which has seen nude photos of several female stars published online, with extortion request sent to prevent the release of others. (Ironically, many of these demands were for payment in bitcoin.) Even if it weren’t for Karpeles’ track record with alleged hacking attacks, the tweet would nevertheless have been ill-advised. As many other public figures have learned, any hint at victim-blaming in this instance is sure to draw criticism. Combine this with the fact that Karpeles’ nearly bankrupted thousands of people, and this comment warrants a special kind of outrage.
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
Apple - Press Info - Re: Celebgate / The Fappening / 4Chan / AnonIB / iCloud rippers / n00d Celeb Trading Ring
bit.ly/1uvDa0P "This statement, which probably had several thousand pairs of lawyer eyeballs on it before it was sent to the press, is slippery. [&] iCloud rippers" || From the Statement: "To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification." + @SwiftOnSecurity "Celebrity photo leak being result of an amalgam of targeted attacks instead of 1 iCloud vulnerability explains inconsistent data and leaks." + @pmarca "Subtext for iCloud hacks: "Security questions" are a bad idea -- too easily guessed, particularly for public figures. Known problem!" + @cdixon "Services that repeatedly ask for passwords on mobile devices encourage weak passwords." + bit.ly/1q86n2z - "I’m talking about the fact that people won’t feel the same way about their phones after this." + anon-ib.com down as of recently + bit.ly/1vKzfks "Apple is now attempting to distance its service from any fault in the hacks." + bit.ly/1rhC9Ky + bit.ly/W7V3H2
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
BBC News - FBI investigates 'Cloud' celebrity picture leaks
Posting of celebrity nude pictures leads to FBI investigation - bbc.in/1nSuXzy +++ FBI probes celebrity photo leaks - bbc.in/1A1UtIo +++ bit.ly/1w34y7C +++ bit.ly/1sWQKJE +++ on.wsj.com/1A0YJrA >> 'If people were no complete script kiddies/amateurs, there will be no forensic trail and no real clear picture of how those pictures got stolen from peoples iCloud and other Cloud Services.' +++ News Corp.'s BSkyB Sky News - youtu.be/2AuRvgOpoYQ +++ bbc.in/1nw4iJ9 - "getting people to use passwords this long [14 chars] is a challenge. "It would be nice if we could get most of the population at least as far as eight characters," +++ bbc.in/1qXX1m2 "celebrities had weak passwords [+] brute force attack [...] We now need to hear from Apple on whether its engineers think that theory holds water. The other key question that needs answering, says Ferguson, is how the hackers obtained the email addresses they would have needed to gain access to the victims' accounts."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter 
september 2014 by asterisk2a
Here’s What We Know So Far About The Celebrity Photo Hack | TechCrunch
bit.ly/1CjSrHz ++ bzfd.it/1vBoAsk ++ bzfd.it/1rJ6ALQ ++ bzfd.it/1pyhUsH - "@ThatSusanBurke You know what's better then leaked nudes? Earning the trust & respect of another human to the point that they share their body with you." ++ "leaker screenshots suggests no mastermind who broke iCloud but a dude named Tristian with too much time on his hands" bit.ly/1qwxjaR & "tl;dr is don't take private photos with an iPhone if you have iCloud on" & "Finding out hard way that "iCloud backup" really means what it says, and deleting from device != deleting from cloud" & "[This attack was not just based on iCloud compromise[/weakness/vulnerability]" & 'Some seem to be from Dropbox and S3 too' & bit.ly/1oytbCY ++ bit.ly/1CjSyCY !!!"non-expert user"!!! ++ bit.ly/1tSYuPn ++ #Consent on.fb.me/1w17jGv ++ Pando bit.ly/1lEU25W ++ "n00d Celeb" Trading Ring on AnonIB: ppl trading&helping hack celeb iCloud accounts et al - bit.ly/1uocm2D imgur.com/a/KDAX3 ++ on.recode.net/1A0rNzE - Apple is investigating ++
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  n00d  Celeb  Trading  Ring  AnonIB 
september 2014 by asterisk2a
Apple Plots Reboot of iTunes for Web - WSJ.com
Apple is exploring an overhaul of the way it sells and stores music that is aimed at extending its influence to the Web, according to people briefed on the strategy.

The key vehicle for the move is Apple's newly acquired music-streaming service La La Media Inc. for which Apple paid $85 million, according to people familiar with the matter. Where Apple's iTunes requires users to download music onto a specific computer, Lala.com lets users buy and listen to music through a Web browser, meaning its customers can access purchases from anywhere, as long as they are connected to the Internet.

Apple is considering adopting that same model for songs sold on iTunes, a change that would give consumers more ways

That new business model extends Apple's grip on the music business, giving it the ability to sell music through search engines and other Web sites and broaden its reach beyond people who come to its virtual store.
apple  itunes  Lala  music  technology  cloudcomputing  cloud  online  streaming  musicindustry  strategy 
december 2009 by asterisk2a

related tags

2.0  4chan  Aaron  advice  affairs  Alibaba  AliPay  Amazon  AnonIB  anxiety  apple  Assange  attack  authentication  AWS  backdoor  backdoors  barackobama  big  Bitcoin  black  blame  blamegame  Box  Braintree  brute  bullying  business  cablegate  Capital  Celeb  Celebgate  Celebrity  CIA  cloud  cloudcomputing  Cloudstorage  communication  communism  consent  Corp.  corporate  Court  Courts  creditcard  crime  culture  cyber  Daily  darknet  DAU  disruption  DOJ  domestic  Drive  DropBox  Dropbox  Drugs  economies  Edward  effect  encryption  engineering  Enterprise  espionage  everyday  exit  exitstrategy  experience  Eyes  factor  Fappening  FBI  feminism  feminist  first  FISA  Five  force  foreign  G  Gawker  GCHQ  Glenn  Google  gossip  Governance  Greenwald  growth  hacker  Hacking  hat  homescreen  hypocrisy  iCloud  imgur  integrity  internet  Intimate  IPO  IT  itunes  jail  Julian  Lala  language  leak  lesson  Levie  M&A  Mail  margin  Mastercard  micropayments  Microsoft  Misogynie  misogyny  mobbing  mobile  model  music  musicindustry  n00d  network  News  NSA  objectification  of  on  One  online  organised  Orwellian  oversight  password  passwords  Pay  payments  PayPal  phishing  Platform  Political  porn  PR  presidency  Privacy  public  Rakuten  Reddit  relations  relationship  revenge  Ring  rippers  round  S3  SAAS  Salesforce  scale  scaling  scam  Secret  security  sexism  sexismus  Sexual  sexualität  shaming  Silicon  slut  Snowden  social  society  Spideroak  Square  Start-Up  Stasi  state  status  strategy  streaming  Street  Stripe  surveillance  symbol  Tabloid  technology  Terror  The  TheFappening  to  too  Trading  transparency  Twitter  two  Unicorn  Unrechtsstaat  USA  user  Valley  valuation  Venmo  Venture  verification  victim  Visa  Wall  Wallet  War  white  Wikileaks  ycombinator  You  Zero 

Copy this bookmark:



description:


tags: