Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

Cancelled Amazon Order Scam

March 11, 2010

 

Example of frequent spam/malicious email we get frequently at TMC. Click on image to enlarge.

For the last few weeks a number of my fellow team members here at TMC have been receiving confirmed and cancelled orders from most likely a malicious source - obviously one which is not Amazon but pretending to be so. With Amazon's massive and continuing success I hope consumers are smart enough to be able to differentiate between the real Amazon emails and those which come from probable thieves linking to the URL highlighted above. I don't want to even reference this URL in writing as it could increase their search engine rank.

Chinese Schools Say They Didn't Hack Google

February 23, 2010

What? Us? Do we look like hackers to you?


Where is James Bond when you need him? The ongoing saga between China and a number of companies who have been hacked from the country takes yet another twist.

ITEXPO East 2010 Photos from Dan York

February 12, 2010

The Microsoftization of Google

February 10, 2010

You have to give Google credit; they seem to want to make the world a better place by opening up the world and making technology and services more accessible. And they are powerful enough to make it all happen - search revenue pours in and is being allocated to services which compete with Amazon and Microsoft among others. In the mobile phone space they go up against Palm, RIM, Nokia and Microsoft.

Yesterday they announced a new social networking initiative called Buzz which is supposed to unseat Facebook and twitter.

DataInherit: A Will for Your Passwords

February 9, 2010

Espionage via APT or Advanced Persistent Threat Widespread

February 5, 2010

Corporate and government secrets are currently being stolen on a grand scale - can anything be done about it?



If you are one of those people not easily rattled, please have a seat and get ready to shake. A new acronym, APT which stands for Advanced Persistent Threat is on the scene and by many accounts is an online threat which is virtually impossible to detect and even worse eradicate. Once your company is infected it seems hackers have access to virtually any and all information on your network.

Tech, Telecom: The Energy is Back

February 3, 2010

 Communications, wireless, consumer electronics, cloud computing, virtualization -- in a turbulent market, it is good to be in technology.


Monster.com was one of the companies I considered to have a natural monopoly in the US job search market a decade ago. Amazingly, social media sites like LinkedIn and Craigslist are making Job sites less relevant and as a result Monster just picked up HotJobs for $225 in cash to shore up its decreasing market share.

A decade or so ago it was common knowledge that satellite radio would eventually make a huge dent in the business of traditional radio companies.

Patent Pooling Taking Off

February 2, 2010

I suggested companies join the RPX patent protection club back in 2008 as I have seen how patent litigation can destroy a company's profitability and force it to lose focus. RPX as you may remember is a firm whose goal is to allow companies to buy into a pool of patents which can be used to protect them against future lawsuits. The idea is a company will think twice about pursuing a patent lawsuit if you can countersue using a huge pool of patents.

Since my original entry, Microsoft, Nokia and Sony have signed up for the service.

ITEXPO East 2010 Miami a Great Success Thanks to You

January 26, 2010

A humble thank you to my followers who came out in support of ITEXPO this past week in Miami. Thank you conferees who braved a tough economic climate and came to the show. I also want to extend appreciation to the speakers, sponsors, exhibitors and attendees at the show. In addition, thanks to our many partners who contributed greatly to the success of this week of events.

China Hack: Is Nothing Secure Anymore?

January 15, 2010

 


When you couple a massive government spying program with triple encryption and unknown exploits in Microsoft's Internet Explorer and Adobe's Acrobat, you get a terribly troubling outcome. It seems the Chinese have banks and banks of engineers hacking the world's software by using government/corporate espionage on a level not before seen. The object of this program was among other things to get source code from the companies which were hacked. In fact they succeeded in stealing much of it.

Featured Events