Remove 2005 Remove Examples Remove Government Remove Manufacturing
article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

Programs like iDefense Labs Vulnerability Contributor Program (VCP) (launched in 2002) and TippingPoint’s Zero Day Initiative (2005) were accused -at the time- of incentivizing the work of criminals and bad actors. . In recent years, even “old economy” industrial and manufacturing firms like Ford, GM and John Deere got into the act.

IoT 98
article thumbnail

Predictions 2021: Disinformation, SPACs, Africa, Facebook, and a Return to Tech Optimism

John Battelle's Searchblog

.” 2021 will be a year where we search for the root causes of our failures over the past few years, and at the center of that failure is a communication system that mindlessly manufactures disinformation. 2005 Predictions. 2005 How I Did. A free and open democratic economy can’t run on b t. Predictions 2010.

Marketing 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Well That Was A Year: A Review of My 2020 Predictions

John Battelle's Searchblog

The suits revolve around antitrust law, so the debate will now be dominated by whether or not the government can prove its case in court. ” Google’s problems with both public perception (hello, three government lawsuits!) Yep, and true to form, 2020 saved the scariest example for the end of the year. 2005 How I Did.

Marketing 111
article thumbnail

Predictions 2014: A Difficult Year To See

John Battelle's Searchblog

Last year, for example, I wrote my predictions based mainly on what I wished would happen, not what I thought realistically would. Last year I asked a senior executive at a major auto manufacturer the age old question: “What business are you in?” 2005 Predictions. 2005 How I Did. Predictions 2010.

Marketing 111
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

This article dives into the lexicon of malware, offering descriptions, protections, and examples of each. Examples of Adware Malware Attacks. While there are hundreds of adware versions, some of the most common examples include Fireball, Appearch, DollarRevenue, Gator, and DeskAd. Examples of Backdoor Malware Attacks.

Phishing 105