Microsoft has revived talks with Yahoo about a possible acquisition, or a merger, although I would think Microsoft would just buy them, but what do I know.
Microsoft Eyes Search Giant In Proposed Takeover Stung by the loss of Internet advertising firm DoubleClick to Google last month, Microsoft has re-invigorated its pursuit of a deal with Yahoo!, asking the company to re-enter formal negotiations. While Microsoft and Yahoo have held informal deal talks over the years, sources say the latest approach signals an urgency on Microsoft’s part that has up until now been lacking, i.e. desperate to beat Google. Both companies declined comment.
Microsoft, Yahoo Reconsider Merger In what appear to be early-stage discussions, executives at Yahoo and Microsoft are taking a fresh look at a merger of the two giant companies or some kind of match-up that would pair their companies’ respective strengths, say those people who say they are familiar with the situation.
Microsoft pursues Yahoo! takeover The same report values Yahoo at $50 billion; and the world renowned bankers Goldman Sachs are giving Microsoft advice on the deal. If the deal comes through, the takeover would be one of the largest corporate takeovers in American corporate history, and likely the largest ever in the Technology sector. Yahoo’s stock was up almost 18% at the time of this posting.
MASSIVE: Microsoft May Acquire Yahoo for $50 Billion Microsoft has reacted to Google’s purchase of DoubleClick by stepping up it’s talks with Yahoo about a possible acquisition/merger. The estimated price tag for Yahoo? $50 billion. Good fit? Bad fit? Frankly, I think it would be an awesome pairing, and (if executed well), it could/should provide a powerful challenger to Google’s web dominance. Why wouldn?t Microsoft buy Yahoo?
One reason I can think would be the possible exodus of Yahoo employees. And some sites are reporting that the deal is for 50 billion, while the Wall Street Journal estimated the price, it didn’t say they were offered that much.
I think it could be a great deal too, not the money, just the pairing, combining of forces and knowledge, and all of that. It will be interesting if it happens.
Some interesting security related stories.
U.S. Database Exposes Social Security Numbers The Social Security numbers of tens of thousands of people who received loans or other financial assistance from two Agriculture Department programs were disclosed for years in a publicly available database, raising concerns about identity theft and other privacy violations.
Google draws privacy complaint to FTC “Google’s proposed acquisition of DoubleClick will give one company access to more information about the Internet activities of consumers than any other company in the world,” the complaint reads. “Moreover, Google will operate with virtually no legal obligation to ensure the privacy, security and accuracy of the personal data that it collects.”
This one could potentially be big, if the data that Google collects from the browsing habits of people with their toolbar, the information they gather from people searching their site(s), the data they collect from their ads on a major portion of the internet, the data they collect from their online programs, like Gmail, Google Docs & Spreadsheets, etc, the data they collect from people using Google Checkout, the data they collect from Youtube and all of the embedded videos, if this data is used by people working for Google or by someone who is able to access it from the outside, it is staggering, I am sure, the amount of information they could compile and use on people.
Depends on your definition I guess, sitting there with nothing running, no one could get into them, on the second day, they sent contestants urls via email and one hacker was able to exploit a vulnerability in Safari and open a back door that gave him access to everything. While they did not crack the OS itself, it did crack a tool that many people use on such a system, it’s the same as all of the IE vulnerabilities that get exploited, though they certainly have the better track record over Windows. Here is more from zdnet.
MacBook Pro hijacked with Safari zero-day Hackers Dino Dai Zovi and Shane Macaulay teamed up to hijack a MacBook Pro laptop at the CanSecWest security conference here, effectively pouring cold water on the Mac faithful’s belief that the machines are impenetrable. Dai Zovi, a former Matasano researcher who has been credited in the past with finding Mac OS X vulnerabilities, exploited a zero-day flaw in the built-in Safari browser to take complete control of the machine.
Seeing through walls Have you considered that someone could be reading what’s on your monitor from a few rooms away? It’s unlikely, but possible, as work by Cambridge University computer security researcher Markus Kuhn shows.
ISP Kicks Out User Who Exposed Vulnerability; Doesn’t Fix Vulnerability Apparently, a college student discovered and published a pretty major vulnerability found in the routers the company uses, allowing anyone to access the routers remotely. Rather than thank the customer for finding and highlighting a pretty serious vulnerability, the company has cut off his service and threatened him with lawsuits. Oh yeah, they also haven’t bothered to fix the vulnerability — despite it being published 7 weeks ago. The reasoning from the ISP is astounding. They claim that since they can’t find any evidence that anyone ever used the vulnerability, he must have discovered it by “illegal” means. Who knew that simply probing for security vulnerabilities was illegal? And, of course, the ISP told the guy he’s not allowed to talk about its legal threat to him — which isn’t actually legally binding. It’s not clear if the ISP doesn’t understand what it’s done or simply doesn’t want to fix the vulnerability.
Interact with the security community CanSecWest, the world’s most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social networking. The conference lasts for three days and features a single track of thought provoking presentations, each prepared by an experienced professional and talented educator who is at the cutting edge of his or her field. We give preference to new and innovative material, highlighting important, emergent technologies, techniques, or best industry practices.