IN the previous post we showed how Microsoft entryism at Amazon led to severe consequences (Microsoft also hijacked Yahoo! through personnel). This post accumulates new examples from the past couple of weeks -- examples where prominent Microsoft employees are entering companies/entities other than Microsoft.
Edward Gibson, Former Chief Cyber Security Advisor for Microsoft LTD in the U.K., Joins PricewaterhouseCoopers' U.S. Forensic Technology Solutions Practice
PricewaterhouseCoopers LLP (PwC) announced today that Edward Gibson, the former Chief Security Advisor for Microsoft LTD in the United Kingdom, has joined the firm as a director in PwC's U.S. Forensics Technology Solutions practice. Mr. Gibson will focus on helping organizations with issues involving investigating economic espionage, complex money laundering, cyber fraud schemes and intellectual property theft. He will be based in PwC's McLean, VA (Tysons Corner) office and will service a wide range of clients in matters of security breach investigation and overall risk management strategies.
While serving as Microsoft's Chief Cyber Security Advisor in the U.K., Mr. Gibson was the chief spokesperson and point of contact for Microsoft Ltd U.K. on all matters of cyber security and IT infrastructure risk management for global businesses based in the U.K., government, law enforcement and security services, press and consumers.
Singapore based Georgie Farmer, Asia Travel Manager, Microsoft, was unanimously appointed to a second term as Regional Chair, ACTE Asia-Pacific by the Association of Corporate Travel Executive’s (ACTE) Board of Directors during a 20 January meeting.
Microsoft is telling some of its biggest fans to stay off Twitter for the next few days.
That's because right now Microsoft is holding its annual MVP Summit -- a gathering of over 1,000 people who are, according to Microsoft, "committed to helping others get the most out of their experience with Microsoft products and technologies."
That’s why you see a lot of the activity going on, Microsoft with their End to End Trust program, Oracle, with some of the security programs they’ve got. You see a lot of private industry critical infrastructure owners and operators saying, “Well, we get the message. We understand that we’ve got to do things differently. We’re gonna put a higher priority on security.”
Man in the Browser a.k.a MITB is a new breed of attacks whose primary objective is to spy on browser sessions (mostly banking) and in that process intercept and modify the web page contents transparently in the background. In a classic MITB attack, It's a very likely that what the user is seeing on his/her browser window is not something which the actual server sent. Similarly, what server sees on the other end might not be what user was intending to send. Why MITB? How different is it from conventional browser hijacking? I'll explain that shortly.