Pages

Owen Wilson's alleged suicide attempt has left executives at Paramount and News Corp.'s 20th Century Fox in a bind. His health aside, the Wedding Crashers star has two films in production and another two to promote for their studios.

But there is one group that stands to benefit from the funnyman's troubles: the insurance companies. While it isn't the sexy story that sells tabloids, a star's downfall translates to higher premiums for the firms that agree to underwrite them.

In order for any film to be made, its stars--track record or not--must be insured. The rationale: With production costs on a typical feature film already at exorbitant sums, any delay--be it from weather, an injury or a star's poor health--can set movie makers back between $100,000 and $400,000 per day. The more likely a star is to cause that delay, the more costly he or she will be to insure.

But just how much more is a decision left up to insurance or underwriting companies. With only a handful in the business, including Fireman's Fund and the Chubb Group, these firms make it their business to understand the film industry and its players. Among other things, each has confidential files on every actor, which include everything from prior medical certificates to claims histories to newspaper or Web clippings pertaining to the star. With that information, and the medical exam and affidavit a star must complete some 30 days before the cameras roll, firms are able to assess the risk.

Advocating on behalf of the production companies are insurance brokerage firms, a similarly small cadre, which include AON/Albert G. Ruben Insurance Services and D.R. Reiff & Associates. Often brought on board before any actor is ever hired, the role of these companies is to compile a list of what they believe are necessary coverages associated with the film. After the insurance carriers quote their terms and conditions for those risks, the brokerage firm selects and recommends the best proposal to the production company.

So while Wilson's example may be garnering greater media attention than troubles past, his behavior, and the insurance implication it carries, is nothing new. From Robert Downey Jr. to Courtney Love to the more recent Lindsay Lohan, underwriting companies have long been feasting on Hollywood's wayward.

The way Ross Miller, a partner with New York-based insurance brokerage firm D.R. Reiff sees it, no actor is actually uninsurable. Or that's what he'd like to believe, since it's his job is to find underwriters to take on the risk that stars pose. "If a studio wants something, or somebody has enough money to throw at a project, then they will make it work," he says.

Brian Kingman, the director of strategic account management at AON/Albert G. Ruben Insurance, agrees: "If you've got enough time, talent and money, anything is insurable."

The reality is this: While the conditions for hiring errant stars may be unappealing--too expensive or too risky--it is almost always possible.

"Some people like to declare [trouble-prone stars] uninsurable, but I think that's way too easy an answer," says Joe Finnegan, vice president of entertainment at Fireman's Fund Insurance Company, the film industry's leading underwriter. Instead, he says it's companies like his that look to find solutions for the production companies. After all: no insurance, no film--or not with the star of choice, anyway.

More often than not, those solutions entail higher deductibles. Miller says production companies are often looking at hundreds of thousands of dollars as opposed to a typical deductible, which can range from $25,000 and $100,000, depending on the movie.

And while most underwriting experts hesitate to provide exact figures--they vary greatly depending on the picture's budget, a star's past, etc.--insurance rates for these troubled types can range from 85 cents to $3 for every $100 of a film's production budget.

The stars can also be asked to put their salary in escrow, making them personally accountable for any losses if their actions were to cause production delays. And if the troubles are drug-related, regular testing can also be required, and chaperones, or "minders," as they're called in the business, can be placed on set to ensure a star doesn't slip up.

Now, whether the star is worth all of this is a question the movie maker must weigh heavily. While that star's record is a critical piece to consider, the box-office potential of the film is worth factoring in as well. As in, are we dealing with The Life Aquatic or Wedding Crashers?
Everybody knows it's not a dog's life to be rich, but no one knows this better than a rich person's dog.

Leona Helmsley, dubbed the "Queen of Mean" for personifying the 1980s stereotype of greed and excess, made her pet Maltese Trouble her biggest heir, leaving a $12 million trust fund for the pet in a will that disinherits two grandchildren and doesn't even mention great-grandchildren.

Helmsley, who died last week, put contingencies on the inheritances of the two grandchildren who will actually get some money: They have to visit their father's grave site once a year. No such demands are made of Trouble.
In Pictures: Lifestyles Of The Pets Of The Rich And Famous

And her chauffeur got $100,000.

Sound wacky? It may be, but it isn't rare. Inheritances for pets are not uncommon among the wealthy, according to Russ Alan Prince, of Prince & Associates, who tracks the habits of the rich. That's especially true of people who tend to alienate all other humans in their lives.

"For some wealthy people, the only true love they get is from their pets," Prince says. "They're estranged from their children, they are at war with their business partners, but their pets are always there for them."

It would not be a stretch to put Helmsley in that camp, if tabloid tales of her terrorizing employees and executives of her husband's real estate empire are to be believed. She is perhaps most infamous for telling a housekeeper that "only the little people pay taxes," a comment that came out during her trial for tax evasion in the late 1980s.

Trouble once appeared in ads for Helmsley hotels and no doubt led a pampered life. The dog is to be buried alongside Helmsley and her husband, Harry Helmsley, in their $1.4 million mausoleum in suburban New York.

According to Prince, rich people who love to lavish money on their pets (a category he calls "pet-focused") spend $328,000 on their pets annually. His survey, released this year, included 304 affluent families who describe themselves as pet lovers, 46% of whom say their love is singularly focused on their own pets and the rest who are animal lovers in general. The survey group was 58% female with a mean age of 56 and a mean net worth of $46.7 million.

The biggest spending area is in "life enrichment" services.

This includes everything from deep-muscle massage (pet masseuses can make up to $2,000 an hour, Prince says) and psychic readings to life coaching and "cosmic sensitivity."

One-third of pet-focused owners paid for special diets for their pets, not for medical purposes, mind you, but because it was seen as being good for the animals. This includes meals prepared by famous chefs.

More than a fourth of pet-focused owners surveyed said they spend $25,000 or more on wardrobes for their pets. Yes, 25 thousand.

Even better, 16% of pet-focused owners recently surveyed by Prince & Associates spend $25,000 or more on a birthday party for a pet.

Several pets regularly fly around on private aircraft, alone (except for flight crew).

But pet inheritances really raise the bar. More than a quarter of so-called pet-focused owners surveyed had established trusts for their pets in their wills before their deaths. This makes it harder for surviving family members to fight the will, Prince says, and ensures the owner will have at least some say in what happens to the pet after the owner's death.

Seventy-eight percent of pet-focused owners leave money to pets in their wills, to the tune of $526,000, according to Prince. Mostly, the money is to ensure a quality of life for the pet.

Pet trusts are increasingly popular, so much so that 39 states now have statutes outlining them, says Frances Carlisle, a New York estate lawyer who specializes in pet trusts. In most cases, the trusts left behind are small, in the $30,000 range, and meant to ensure that the pet left behind has adequate care and won't be dumped on the street or sent to a shelter.

Because pets are pets, money cannot be left to them directly in a will, so trusts are the next best thing to leaving money to a designated guardian, Carlisle says. The stigma of the kooky old rich lady, present company excluded, is gone. "This sort of thing used to be laughed at," Carlisle says. "But a lot of animals really do end up on the street."

Sometimes the arrangements are punitive, however, and directed at getting revenge on family members.

Prince says he knows of an ostrich that stands to inherit $4 million, all because the owner's children once threatened to cut the ostrich up into food. Somewhere out there a parrot stands between his owner and the owner's children, who stand to lose tens of millions of inheritance money if they fail to follow specific instructions about the parrot's safekeeping and well-being after the owner's death.

"True pet lovers can be off-the-wall already, and what you're doing here is adding money to it," Prince says. So true.
U.S. Internet advertising spending is poised to overtake radio advertising for the first time, providing a reminder that broadcasters need to be more aggressive in their embrace of online opportunities.

U.S. radio ad spending is expected to inch up 1.5% in 2007, to $20.4 billion, short of online ad expenditures of $21.7 billion, which will be up 22% from last year, eMarketer senior analyst Ben Macklin said in a report.

Over the next several years, radio station Web sites and online audio advertising "will be the principal drivers for radio advertising growth,'' Macklin said.

But he doesn't think that growth will add up to much. He expects the sluggish radio advertising market to continue experiencing slow growth, climbing to an estimated $22.6 billion in 2011, when online ad spending is expected to surge to $44 billion.

Terrestrial radio companies like Clear Channel Communications (nyse: CCU - news - people ), CBS (nyse: CBS - news - people ) and Cox Radio (nyse: CXR - news - people ) still retain massive audiences, but consumers are spending less time listening to radio than they do surfing the Web or watching TV.

In addition, only 17% of U.S. consumers consider radio the "most" essential medium, down from 26% five years ago, according to a study released earlier this year by Arbitron and Edison Media Research.

For many advertisers, the choice between radio and non-radio online ads won't be an either-or proposition, Macklin said, pointing to studies showing that consumers often listen to the radio while consuming other media and that a mix of terrestrial radio and online ads can be far more effective than online ads alone.

"There are many synergies between radio and the Internet and, for the most part, they complement rather than compete with each other,'' he said. "Advertisers should not abandon radio in favor of the Web but combine the two media to take advantage of the unique attributes of each."

Those might sound like encouraging words for the radio industry. But as Macklin's estimates show, these new opportunities don't appear likely to kick-start the radio industry out of its doldrums.
Sony can't seem to keep its hands off its customers' hard drives. Earlier this week, two security companies found that fingerprint-scanning USB drives sold by the company install hidden software on users' computers, just two years after a similar tactic led to mass recalls of another Sony product and a string of lawsuits.

In this case, the hidden program, known as a "rootkit," was used to enable a security feature on Sony's (nyse: SNE - news - people ) Microvault USB drives, which verify the identity of the user by reading his or her fingerprint. Paradoxically, security researchers say, it instead creates a gaping security vulnerability; the rootkit creates an invisible folder that allows cybercriminals to install their own malicious software where it can operate undetected, potentially stealing passwords or sending spam e-mail.

Sony spokesman Tom Di Nome points out that the three Microvault models that employ the fingerprint-scanning technology are no longer being manufactured. He also says the company is currently investigating the source of the problem and "taking the issue very seriously," though no security problems have yet been reported by the USB drives' users.

The rootkit's discovery, originally made by the Finnish company F-Secure and later verified by McAfee (nyse: MFE - news - people ), opens a barely healed wound for Sony. In 2005, digital rights management software on Sony BMG music CDs, designed to control users' attempts to distribute and copy music, was found to install an invisible rootkit folder when customers played the CDs on their computers.

Consumers soon protested Sony's aggressive restrictions on copying music and disregard for security. Sony's executives were initially unresponsive; the company's global digital business president Thomas Hesse infamously told NPR's Morning Edition in November 2005 that "most customers don't even know what a rootkit is. So why should they worry about it?"

But as viruses and malicious software exploiting the rootkit began to surface, Sony issued a recall of all affected CDs later that month. Not soon enough, however, to avoid lawsuits from the Federal Trade Commission, multiple state attorney generals, and several class actions, alleging that Sony's CDs violated state laws defining fair business practice and prohibiting spyware. The company eventually paid around $6 million in settlements; the negative publicity surrounding one of the country's first commercial spyware scandals likely cost Sony much more.

Given that history, it's hard to imagine why the company would repeat its careless coding, says Ari Schwartz, deputy director of the Center for Democracy and Technology. "I can't see why any company would use this kind of software after the legal action taken against Sony," he says. "The fact that this is actually another Sony subsidiary is especially shocking."

In fact, the timing of the discovery is especially ironic, given that Sony just last month filed a lawsuit against one of the developers of DRM software that led to the company's 2005 blowup. Sony is demanding $12 million in damages, arguing that The Amergence Group breached the terms of its licensing agreement by delivering software that was negligently designed.

Sony's newest instance of the rootkit coding, which again invites exploitation from malicious software writers, is a symptom of the software industry's general inattention to security issues, says Dave Marcus, a spokesman for McAfee. "It's a huge problem," he says. "This is reflective of the fact that software vendors simply aren't thinking from the perspective of malicious coders."
Siemens Public Communication Networks has moved the Supreme Court challenging the defence ministry's decision to award a contract for supply of telecommunication software to rival Selex Communications SpA.

Challenging the Delhi High Court order that dismissed its petition, Siemens sought to restrain the ministry and Bharat Electronics (BEL) from negotiating with any other bidder contending that it was the lowest bidder for the tender.

The high court while refusing to stall the entire project had rejected its plea on the ground that it did not deserve interference as the decision making process adopted by BEL was not malafide or intended to favour any of the vendors.

BEL was the prime contractor for the Indian Army's modernisation plan for its technical communication system (TCS) and had invited bids on behalf of the ministry of defence. The bids were for supply and transfer of technology of 80 Digital Radio Trunking System, also known as Terrestrial Trunked Radio (TETRA), a major component in the TCS programme of the army.

An Empowered Technical Committee had recommended three vendors - Siemens, Selex and Thales Land and Joint Systems. However, the army in January this year informed the government that it required 1,200 vehicle mobile terminals (VMTs).

The contract was later awarded to Selex. The high court had also held that Siemens itself was responsible for the inadequacy in its bid and cannot blame BEL under the garb of saving revenue.
Apollo Health Street (AHS), a part of the Chennai-based Apollo Hospital Group, has acquired Zavata Inc, an Atlanta-based business process outsourcing (BPO) and enterprise support (ES) solutions company, for about Rs 700 crore.

The combined organisation will have more than 100 customers and over 2,500 employees spread across multiple locations in the US and India.

Post acquisition, AHS will become the largest healthcare-focussed BPO company in the country.

Satish Sanan, executive chairman and CEO of Zavata, will stay on as a consultant in the merged entity. Zavata's employees are located in client centers and offices in Georgia, Pennsylvania, New York, California and Florida in the US and Hyderabad in India.

"There are significant synergies to be achieved from this transaction, and the acquisition of Zavata has helped us position AHS as one of the largest, fully integrated healthcare BPO companies in the world with further capabilities in providing enterprise support services. In addition to the set of services we already offer, Zavata adds a complementary set of services including expertise in areas such as full business office and emergency medical transport billing," said Sangita Reddy, managing director, Apollo Health Street.

This is the fourth acquisition by Apollo Health Street and the second in the US.

Bank of India and Barclays Capital jointly structured and provided the debt financing for the transaction, sources said.
Public-sector power equipment maker Bharat Heavy Electricals today announced it has bagged a Rs 1,990-crore order for supply and installation of steam generator and steam turbine packages at the upcoming Vallur Thermal Power Project at Ennore in Tamil Nadu.

Outbidding leading European equipment suppliers, BHEL received the order from NTPC-Tamil Nadu Energy Company (NTECL), a joint venture between NTPC and Tamil Nadu Electricity Board (TNEB).

The order comes close on the heels of BHEL winning three contracts for supply and installation of seven sets of 500 MW each at Jhajjar STPS, Koderma TPS and Durgapur Steel TPS, it said in a release.

Being set up under the government's mega power project policy, the Vallur project is targeted for synchronisation during the 11th Plan and would add nearly 24 million units every day to the grid on commissioning.

As per the order, BHEL's scope of work would involve designing, engineering manufacturing, supply, erection and commissioning of steam and turbine generators, electrostatic precipitators, associated auxiliaries and controls and instrumentation system.

So far, BHEL has won orders for supply and installation of 60 units of 500 MW each, of which 31 have been commissioned.

Aimed at equipping itself to meet the country's power capacity addition targets in the 11th Plan and beyond, BHEL is enhancing its manufacturing capacity in the next three years, from the current level of 6,000 MW to 15,000 MW per annum, the release said.
It’s no secret which vendor is the 800-pound gorilla of the database market.

According to a BusinessWeek article, which cites information from Gartner, Oracle commanded more than 47 percent of the $15.2 billion market in 2006, far ahead of No. 2 IBM with 21 percent and Microsoft with 17.4 percent. Not only that, but it dazzled financial analysts with its 46 percent operating margins and booked an impressive $14.2 billion in revenue.

Being big does have its burdens. The more dominant the vendor, the louder the chorus of voices questioning the need for upgrades when new iterations of flagship products are introduced. Microsoft found itself in this spot earlier this year with Vista, and now it’s Oracle’s turn with 11g, the first new version of its relational database since 2004.

The software includes more than 400 new features, many of which are detailed in this IT Jungle piece. Among them: something called Real Application Testing, that Oracle says can cut the typical testing cycle for database applications from 150 days to just 11 days, and integrated compression, which helps companies reduce the cost of disk storage even as they store larger amounts of data.

The Oracle faithful (that is, members of the Independent Oracle User Group) appear ready to bite, with 35 percent of them saying they plan to move to 11g within the next 12 months and more than half expressing intent to upgrade within two years.

ZDNet blogger Larry Dignan thinks uptake may be even more rapid than that since Oracle provided a set of what he calls “quite logical” ROI cases at yesterday’s product launch.

BusinessWeek points out that Oracle CEO Larry Ellison’s penchant for power plays such as poking a stick at leading Linux distributor Red Hat by selling Linux support at cut-rate prices and accusing rival SAP of espionage generated more headlines than any Oracle product news in 2006.

The rest of 2007 should be interesting.
With the competition for talented employees remaining hot and heavy, it’s no surprise that companies don’t want to leave any recruitment avenues unexplored — including those in cyberspace.

Social networking sites like Facebook, while still primarily used for staying in touch with friends, are also attracting the interest of corporations interested in using them as recruitment tools.

UK job recruitment site Jobtonic created a Facebook add-on that allows Facebook members to display job openings from Jobtonic in their personal profiles and to earn £2,200 (U.S.$4,480) for successful referrals, reports vnunet.com.

This seems a good fit for Jobtonic, which appears to position itself as “edgy,” based on a cursory Web search that turns up an employee predilection for blogging, with one blog referencing a bright orange Jobtonic-branded VW Camper van that is cruising the streets this summer. Representation on Facebook isn’t confined to the edgy, though, based on an 8,000-member Ernst & Young group that is used to attract potential hires.

And Facebook isn’t the only virtual venue for recruitment. The Wall Street Journal has reported that some companies now conduct job interviews in Second Life. (The vnunet.com piece mentions that Accenture has opened a virtual “office” there.)

KPMG also notes in a recent report that large corporations are using professional headhunters less and relying on their own Web sites more for recruitment.

In our best Luddite fashion, we feel compelled to point out the hazards in relying too heavily on such approaches. As vnunet.com notes (and offers a real-world example to prove), the automatic filtering tools on Web sites mean that prime candidates can get overlooked if they don’t include the “right” wording on their online resumes.

There’s also the little problem of how easy it can be to deceive folks (including recruiters) on the Internet.
Despite the Internet’s famously short attention span, Google has been the most buzz-worthy tech company for nearly a decade. Computerworld recently named the search giant the top e-commerce development of the past 10 years.

Yet, now Google appears to be in danger of losing that status to Facebook.

Once merely an also-ran to MySpace, Facebook is now being touted as “a do-everything site with the potential to devour the whole Internet,” according to a Slate article. The article speculates that Facebook wants to become “an all-encompassing portal” similar to MyYahoo or iGoogle.

While that prediction sounded radical enough when first published in late June, it now seems almost laughably small-potatoes in light of the current speculation following Facebook’s acquisition of Parakey, a Web-based operating system created by two co-founders of Firefox.

As blogger Simeon Simeonov points out, the Parakey buy positions Facebook to become a new breed of operating system that allows content to flow freely between the desktop and the Web. In one swoop, Facebook appears to have advanced beyond what Google has been doing with Google Apps and Google Gears.

Facebook trumps Google, which has been buying up apps, by opening up its platform to third-party developers and offering to let them make money by advertising. Translation: You’ll see the “next big thing” on Facebook before Google.

What, if anything, does all of this mean for the enterprise?

IT Business Edge blogger Loraine Lawson isn’t sure. Facebook will hold great appeal for the increasing numbers of folks who want to merge their business and social lives “in ways that are not intrusive, that feel intuitive and which are both highly productive and deeply satisfying,” says ZDNet’s Dan Farber. Translation: That’s everyone under 30, some of whom will work for you soon — or eat your lunch at their own startup.
Despite their significant investments in CRM technologies, banks don’t seem to have particularly close relationships with their customers.

According to an IBM survey released late last year, two-thirds of U.S. consumers don’t feel valued by their banks. IBM concluded that while banks have largely succeeded in “rational” aspects of customer relationships such as correcting errors and providing multiple banking channels, they haven’t fared as well in fostering “emotive” contact.

More recently, Accenture advised British banks to revamp their customer databases so they could provide marketing offers of relevance to their customers — especially women, who are typically more willing than males to switch banks.

The key, says an Accenture analyst quoted in The Register, is “delivering carefully-crafted products supported by clear, targeted and timely advice utilizing both the Internet and well-informed advisers.”

Oops. According to a recent survey by customer service software provider Transversal, most banks were able to provide answers for only about half of routine customer questions online — mostly through static FAQ sections. Some 30 percent of bank Web sites struggled to answer more than two out of 10 product or service questions.

Having spent lots of time browsing through bank Web sites at my previous job, I suspect these numbers are true. I had frustrating experiences at many of the sites I visited and would often resort to picking up the phone and calling the banks.

That’s what many customers do as well, notes Transversal in a silicon.com story about the survey. The good news, according to Transversal, is that bank contact centers have “dramatically” improved their response times, answering 60 percent of calls within three minutes. The bad news, of course, is that contact centers would likely get a lot less business if banks adopted a “cohesive online customer interaction strategy.”

At least some experts, including Gartner, recommend that banks incorporate so-called Web 2.0 features such as wikis, podcasts and blogs on their Web sites. Gartner also says that banks should consider partnerships with online social networks. It’s a strategy already being used by a few strong tech adopters like Wells Fargo, Bank of America and KeyBank.
Poor Wal-Mart. The retailer just can’t seem to master the whole Web 2.0 thing. (Though to be fair, the company is far from the only one.)

Still stinging from the negative publicity fallout of a botched blog, Wal-Mart is trying to adopt some of the same Web 2.0ish features that have been successfully employed by other companies, notably consumer product reviews and ratings, reports Reuters.

The company’s chief marketing officer called such reviews (which have been popular on other sites) “the No. 1 customer-requested feature.” Wal-Mart is hoping the feature engenders warm-and-fuzzy feelings among at least some of the approximately 130 million people who visit its stores and/or its Web site every week. In the future, it may use the reviews to help make decisions about the products it sells.

A little more than a month after the feature was added and with an admittedly fuzzy value proposition, it’s too early to tell if this feature is living up to the company’s expectations. A sign that Wal-Mart may still not quite “get” it: its intention to take five to seven days to review the reviews before publishing them.

Already considered a success, reports Reuters, is a feature that allows customers to order stuff online and have it shipped for free to a Wal-Mart store for pick-up. Wal-Mart says customers typically spend an additional $60 in stores during the pick-up process. Taking a cue from Amazon, it makes sense for Wal-Mart to leverage its formidable supply-chain and logistics expertise.

Less successful for the retailer was a foray into Facebook, where members of a group ostensibly created to help college students swap decorating tips for dorm rooms have been more interested in discussing controversies over Wal-Mart’s treatment of its employees. Like digg.com before it, Wal-Mart has learned that it’s tough to control how users behave online.
According to the Washington Post, other retailers have had considerably better luck with their online marketing strategies to reach the desirable teenage demographic, many of whom spend as much time on social networking sites as they do watching TV. American Eagle Outfitters, for instance, has more than 46,000 friends on its MySpace page as well as a site called 77E that features “It’s a Mall World,” a series of three-minute adventures of fashion-conscious friends.

The stakes for retailers and other businesses could be quite high if folks like Internet visionary Vint Cerf are right. Speaking recently at the MediaGuardian Edinburgh International Television Festival, Cerf predicted that folks will ultimately choose to consume the majority of their entertainment and other content online.

“You’re still going to need live television for certain things - like news, sporting events and emergencies - but increasingly it is going to be almost like the iPod, where you download content to look at later,” says Cerf in a Guardian story about the event.
This PC Advisor story — which focuses on the carelessness of UK Facebook members — will depress security personnel. Facebook, of course, is worlds away from corporate applications. But not all Facebook users are teenagers and some of the behaviors described in this story no doubt are carried into the workplace.

That’s a scary thought. Without getting too deeply into the minutiae of how Facebook works, the story describes how easily folks allowed access to vital information, including in some cases their mother’s maiden name. The bulk of the story is based on Facebook members’ reaction to a fake profile set up by security firm Sophos. Twenty percent of those who received random requests allowed access to their full profiles. The story says that 72 percent of those who allowed access also gave out their e-mail addresses, 84 percent revealed their dates of birth and 23 percent provided their phone numbers.

The key point isn’t that Facebook users are careless. It’s that people in general are careless. Perhaps such behavior so boogles the collective mind of the IT department that they have trouble dealing with it. Unfortunately, there are a legions of folks out there who just don’t get it. Some of these use corporate computer networks. Worse yet, some of these folks actually run the companies.

There are a number of ways that user sloppiness can hurt the organization. Phishing, of course, is one. The danger of criminals’ clever rouses designed to separate people from their identifying data is evident by research done by Markus Jakobsson at Indiana University. Jakobsson — whose work was outlined in ComputerWorld’s coverage of the Usenix Security Symposium in Boston — ran experiments that showed people are willing to trust half-signed digital certificates. While subjects did a good job of not clicking on links in e-mails, some did copy URLs and paste them into their browser, which also is potentially dangerous. Finally, Jakobsson found potential problems with credit card procedures and the willingness of professors to use university passwords to gain access to sites that didn’t look like they were hosted by the school.

DogReader does a good job of describing the next phase of phishing, which is spear phishing. This is the practice of using specific information to send a request for information that appears more realistic. The example used in the posting is an e-mail that appears to come from the IT department asking for an employee’s security code. If done well, it is difficult to distinguish between these forays and legitimate e-mail.

Phishing is one way in which user ignorance or laziness can cause losses. Another is physical. TechNews offers several tactics to ensure the safety of laptops: Treat the device as cash; keep it locked; store passwords elsewhere; don’t ever leave it alone, and be especially vigilant in hotels, airports and, presumably, similar venues such as public hot spots.

The unfortunate reality is that there are many ways in which employee ignorance, laziness, or even, in some cases a desire to do a good job can cost a company. Perhaps the most frightening single issue, however, is that the awareness of the dangers seems to be strikingly low. Combining this with the cleverness and brazenness of cyber criminals creates great danger for organizations. This drives home the need for proactive corporate policies backed by strong technology.
This nicely done Computerworld column lists 10 statements coming from security vendors, consultants or partners that could spell trouble.

The theme is that the person on the receiving end of the pitch must listen very carefully and dismiss anything that sounds even remotely categorical, hyperbolic or makes promises that, if kept, actually can lead to problems (such as making data too easily available). Thus, security buyers simply need to use the same common sense and skepticism as when they buy a car or a flat screen television. A big danger is that the person making the pitch could be cutting corners with full disclosure. This sort of thing is natural, and is bound to become more common as the security sector consolidates and the business gets more cutthroat.

Of course, there is no direct correlation between what software salesmen may say and the possibility of attaching legal penalties to insecure products. However, both speak to the bigger issue of security software integrity. Though it seems farfetched, a report by the Lords Science and Technology Committee — a link to it is available in this Techworld piece — suggests holding companies responsible for flaws in their software products.

Vendors reacted predictably. Symantec said such laws would have the opposite of the intended impact and hurt end-user security, while a Sophos executive pointed out the difficulty of figuring out who was to blame. A representative from McAfee said implementation often is the culprit, not the security itself.

The mix of opinion extends to Bruce Schneier — a well-known security analyst who testified in favor of the approach in front of the House of Lords — and this blogger, who argues in a long post that forging a set of rules to force improved security is impossible in as immature an area as security software.

The reality is that competition among security vendors is rising, prices are shrinking and many products are moving toward becoming commodities. That’s good for end users, of course. But it also means that there is more pressure on vendors and the ecosystem of which they are part. The bottom line is that every statement vendors make must be vetted very carefully and, in the long run, financial pressure may mean that less care may be paid to products. Does this mean the logical conclusion — that vendors be held legally responsible for bad software — will come to pass? We think it’s unlikely. But it clearly is an interesting idea.
Back in June, we blogged about the plans of a couple of Indian outsourcing firms, including Wipro, to step up their hiring of American workers in the U.S. Mentioned in that blog was Wipro’s intent to open two software development centers in the States.

Now Wipro is making good on at least part of those plans, with its announcement that it will employ up to 1,000 U.S. workers at a development center in metro Atlanta over the next three years. About 6,000 of Wipro’s 80,000 employees currently work in the U.S.

An executive with the Metro Atlanta Chamber of Commerce tells the Atlanta Journal-Constitution that Wipro is “the right kind of global company we have been trying to recruit”and adds, “This could open the door to other companies from India.”

Indeed, Georgia is so committed to going after Indian firms that the state’s Department of Economic Development is interested in opening a trade office in India by 2009, according to the Journal-Constitution story.

There is an element of irony, of course, since many U.S. IT workers say the industry has been losing jobs to Indian firms like Wipro for years.

Several factors are behind Wipro’s decision: a weak dollar/strong rupee combination that makes it more cost-effective to hire folks in the U.S.; wage inflation and high attrition rates among workers in India; and a desire for more U.S.-specific business expertise.

Wipro already has some big-time clients based in or near Atlanta, including Delta Air Lines, BellSouth (recently acquired by AT&T) and the Coca-Cola Co. Wipro is reportedly considering opening two other development centers in the U.S., with Texas and Virginia among the leading candidates.

While the Journal-Constitution story is largely positive, it wraps with a quote from an Economic Policy Institute expert: “There’s no doubt some jobs will be created, but who are they putting out of business with the products they’re selling to the U.S. business community? For the first time we’re seeing the process of in-sourcing eliminating domestic jobs.”

A “highly critical” flaw in MSN Messenger could allow hackers to execute code by getting users to accept an invitation to a video chat, reports ZDNet blogger Ryan Naraine.

Windows Live Messenger 8.1, the latest version, is not affected. Microsoft is investigating the flaw, according to vnunet.com, but for now is advising users to update to 8.1
Your Ad Here