To any British kid who grew up watching James Bond, it might appear that Her Majesty’s Secret Service is clever enough to defeat any adversary. After the Snowden revelations, many people have changed their mind about whether spies are still the good guys, but it’s almost impossible to shake that English belief that the UK is home to the smartest of all spooks.
Microsoft Corp. is in talks to acquire Israel-based cybersecurity startup Aorato Ltd., according to a person familiar with the matter, who said the deal was worth around $200 million and could close within the next two months.
Microsoft declined to comment and Aorato wasn’t immediately available for comment. Founded in 2011 by veterans of the Israel Defense Forces technology units, Aorato develops and sells software that monitors access to central communication components in enterprise IT systems.
The University of Bristol has researched ways to transmit high quality video over wireless signals to handle the growing amount of mobile video traffic attributable to the rise of smartphone apps.
Published in the journal IEEE Transactions for Mobile Computing, the research was led by professor Andrew Nix and Dr Victoria Sgardoni from the University of Bristol's Communication Systems and Networks group.
Three years ago, we criticized Google for going down the same mistaken path as other social networks with a "real names" policy for its Google+ system. We pointed out how Friendster had made this mistake in 2003 and Facebook had also similarly focused on such policies in 2007 (through today), without recognizing the importance of enabling anonymity and pseudonymity. While some people insist that "real names" guarantees a higher level of conversation and/or participation, there is little evidence to support that.
Microsoft's widely used software for brokering network access has a critical design flaw, an Israeli security firm said, but Microsoft contends the issue has been long-known and defenses are in place.
Aorato used public information to craft a proof-of-concept attack that shows how an attacker can change a person's network password, potentially allowing access to other sensitive systems, said Tal Be'ery, its vice president of research.