7.4 C
London
Friday, November 24, 2017
Home Tags Share Price

Tag: Share Price

Tesla still working on making a factory the “machine that builds the machine.”
The iPhone maker says its new face unlocking tech worked as intended.
An attack at subsidiary TNT Express may disrupt FedEx's push to hit a record-high share price.
Avis shares are surging as a result.
Stock falls 13 percent in one day after bad sales numbers.
The impact of data breaches can be measured in a company's share price and customer churn.
Data breaches smack bottom line, cautions survey Companies that suffer a data breach can expect to see their share price fall by five per cent and watch two to three per cent of customers take their business elsewhere.…
19/Apr/2017 2016 reached a nine-year high in consulting M&A volumes, according to Equiteq’s Global Consulting Mergers & Acquisitions Report 2017.

Despite deal activity falling in the quarter prior to the US Presidential election and the UK’s Brexit vote, deal volumes were up 1%. Outperforming the S&P 500, the strength of the consulting sector was further demonstrated as the Equiteq Consulting Share Price Index ended 2016 up 14%, a 10-year high.The top consulting segments for deal... Source: RealWire
At more than $311 a share, Wall Street pegs Tesla as the most valuable US automaker.
Bid to mitigate damage in face of declining anti-virus sales Symantec has bought identity theft protection firm LifeLock for $2.3bn. The deal, announced Sunday, represents a brave bid by Symantec to shore up a consumer security business eroded by dwindling anti-virus sales. Selling Norton consumer security alongside identity protection and remediation services from LifeLock will enable sustainable "consumer segment revenue and profit growth", according to Symantec.

The security giant said it plans to finance the transaction with cash supplemented by $750m of new debt.

The deal – which is subject to LifeLock stockholder approval and US regulatory approval – is not expected to affect Symantec's FY17 results. Symantec's share price dropped marginally on the announcement of a deal that effectively involves it "doubling down" on the consumer security market.

Data breaches and the identity theft that sometimes results are a growing problem but whether the sometimes controversial LifeLock offers a comprehensive defence is far from convincing. LifeLock's identity theft protection system is designed to alert subscribers about fraudulent applications for loans, credit cards or other financial services. The $2.3bn price tag ($24 per share) offered from Symantec represents a 16 per cent premium on LifeLock's Friday closing share price of $20.75, itself a year-long high. LifeLock was also reportedly being pursued by private equity firms Permira, TPG, and Evergreen Coast Capital, as well as Symantec. Symantec sold data storage software firm Veritas to Carlyle Group for $7.4bn earlier this year.
Since then it has purchased Blue Coat for $4.65bn and now LifeLock for $2.3 billion in a bid to redefine itself as a pure play cybersecurity firm. The purchase price looks high even though LifeLock is profitable.

The company's net income for 3Q16 came out at $14.4m on sales of $170.3m. Last year LifeLock was obliged to pay $100 million to settle charges (PDF) of failing to maintain a comprehensive information security program and deceptive advertising.

The court order followed FTC enforcement action against LifeLock for alleged violations of an earlier 2010 order. ® Sponsored: Customer Identity and Access Management
Troy Hunt talks down the state-sponsored hack threat Interview Despite the hype about state-sponsored hackers, most breaches are actually the result of either criminal activity or "kids messing around", according to breach expert Troy Hunt. Hunt, operator of the breach notification service Have I Been Pwned, noted that many of the current spate of breach disclosures actually stem from attacks that took place in or around 2012. “We’ve seen anything on this scale since Adobe,” Hunt told El Reg. “Motives differ with LinkedIn, for example, designed to make money.
Sony was state sponsored and Yahoo – if we take them at their word – was state-sponsored.” Hunt expressed doubt about Yahoo!'s contention of a state-sponsored attack which led to half a billion accounts being exposed, referencing recent research by InfoArmor that offered up the theory that criminals were behind the attack. “Blaming state hackers has become like a ‘dog ate my homework’ excuse,” he added. El Reg caught up with Hunt for 30 minutes shortly after he spoke about data breaches and other matters at the ScotSoft conference in Edinburgh on Thursday. He said that large datasets such as the LinkedIn cache were commonly dumped online by hackers when when they are “no longer profitable to sell”.

There are exceptions to this rule such as Ashley Madison, where hackers immediately leaked the purloined data as wide as possible in an effort to embarrass and pressurise the business. Hunt criticised TalkTalk as “negligent” over its October 2015 reach and criticised the record £400k fine imposed by data privacy watchdogs at the ICO as insufficient to serve as any deterrent. “TalkTalk was fined 0.02 per cent of revenue, something that will have no impact on its business,” Hunt said. “TalkTalk was hit by a 15 year old kid using free software, not a sophisticated attacker.” TallkTalk was “negligent” in being unable to defend against the attack it suffered, according to Hunt, a Microsoft regional director and MVP for developer security. Some breaches can have an effect on share price.

For example, the share price of Paysafe dipped before recovering after it emerged that Neteller and acquired firm Skrill had suffered a breach. Running haveibeenpwned has given Hunt a singular insight into major data breaches, how hackers operate and the weaknesses they exploit within organisations.
Some cases show that at least some large organisations are beginning to follow industry best practice of password handling.

For example, metadata from the Dropbox breach shows that the organisation was halfway through moving from the ageing SHA1 technology to pcrypt for password hashing. ®
No conclusive evidence of bricked devices, say uni experts Researchers at the University of Michigan (U-M) have poured doubt on one claim by MedSec that St Jude Medical's implanted pacemakers and defibrillators are remotely breakable. Last week MedSec went public with a report saying that life-giving devices sold by St Jude Medical could be wirelessly compromised by hackers – who could either brick the vital equipment or empty their batteries of charge by sending malicious signals from afar. Rather than try to get the issue fixed with the manufacturer, MedSec partnered with investment firm Muddy Waters Capital to short St Jude's stock.

This allowed the pair to cash in when they made their vulnerability findings public and the healthcare company's share price fell. St Jude called the damning MedSec dossier "false and misleading." Now U-M says some of the security shortcomings detailed in the MedSec report aren't as serious as first feared.

The uni researchers attempted to recreate MedSec's attacks and found that in one case so far, the evidence the security firm presented is flawed. "We're not saying the report is false. We're saying it's inconclusive because the evidence does not support their conclusions. We were able to generate the reported conditions without there being a security issue," said Kevin Fu, U-M associate professor of computer science and engineering and director of the Archimedes Center for Medical Device Security. "To the armchair engineer it may look startling, but to a clinician it just means you didn't plug it in.
In layman's terms, it's like claiming that hackers took over your computer, but then later discovering that you simply forgot to plug in your keyboard." MedSec's report includes a photo of error messages on a wireless monitoring station for a defibrillator as evidence that a radio-based attack successfully crashed the implanted widget. When the station's wand is waved over the defibrillator, fault alerts are shown that suggest the gadget has died because there's no live information coming from it.

The dossier reads: In many cases, the Crash Attack made the Cardiac Device completely unresponsive to interrogations from Merlin@home devices and Merlin programmers.
It was therefore impossible to tell whether, and how the Cardiac Devices, are functioning. MedSec strongly suspects they were in many cases “bricked” – i.e., made to be non-functional.
It is likely physicians would explant a device that did not respond to the programmer. In some cases, a Cardiac Device subjected to a Crash Attack was still able to communicate with the programmer, and the information displayed was alarming. According to U-M's team, though, the implanted pacemaker or defibrillators can and will continue operating as normal even if readings to the monitoring station are disrupted. In other words, there's no conclusive evidence that the pacemaker or defibrillator actually stopped working after the radio communications were jammed.
It's more of an annoyance for whoever is using the monitoring terminal than a potentially lethal situation. "We believe the pacemaker is acting correctly," Fu said. Youtube Video "It's obviously not an attempt to recreate the attack," a Muddy Waters spokesperson told The Register. MedSec declined to comment on the matter. In El Reg's view, if the communications are temporarily disrupted it's hard to see how this is a super serious issue. On the other hand, if the radio jamming stops all further communication from the implant to a monitoring terminal, that's going to potentially require surgery to fix, which is not optimal. However, bear in mind, there is no hard evidence that a device is "bricked" – merely MedSec's strong hunch that this has happened. That's what all of last week's screaming headlines were based on. "While medical device manufacturers must improve the security of their products, claiming the sky is falling is counterproductive," Fu noted. "Healthcare cybersecurity is about safety and risk management, and patients who are prescribed a medical device are far safer with the device than without it." The U-M researchers are still going through the MedSec report, so there's room for more discoveries or revisions to their conclusions.
In the meantime, the whole case has raised concerns among many in the computer security industry that the startup's unorthodox tactics may have needlessly terrified patients using St Jude's products. "It's my personal view that ethically it's really hard to understand why people would have to go through this," Sam Rehman, CTO of application security vendor Arxan Technologies, told The Reg. "The whole point of the security industry is to build trust by protecting systems." ® Sponsored: 2016 Cyberthreat defense report