Duncan Riley
Latest from Duncan Riley
Despite US attempts to block ZTE deal, China OKs Qualcomm’s NXP acquisition – or did it?
Chinese regulators Thursday approved Qualcomm Technologies Inc.’s acquisition of NXP Semiconductors N.V., the last hurdle of nine the deal has jumped over, according to reports. Or did they? The approval, as initially reported, came despite attempts by Congress to derail the Trump administration’s ZTE deal, the pair of deals seen by some as a quid pro quo ...
SEC official: Traditional cryptocurrencies aren’t subject to securities law but most ICOs are
Nearly a year after first stating that tokens issued as part of initial coin offerings may be subject to securities law, a U.S. Securities and Exchange Commission official says traditional cryptocurrencies are not in fact securities. The clarification comes from William Hinman, head of the division of corporation finance at the SEC. He told an audience ...
AT&T’s acquisition of Time Warner closes, raising concerns over net neutrality
AT&T Inc.’s $85 billion takeover of Time Warner Inc., the acquisition closed today following a ruling Tuesday by a U.S. District Court judge that overruled a ban by the Department of Justice, but the deal is raising concerns in the tech community over net neutrality. The combined company now includes leading entertainment and online streaming properties ...
Continuum snaps up CARVIR for improved managed service provider security
Remote monitoring and management startup Continuum Managed Services LLC today said it has acquired CARVIR, a cybersecurity company specializing in monitored and managed security, for an undisclosed sum. With the deal, Continuum will add CARVIR technology to its technology platform for managed service providers to enable information technology service providers to meet the security and compliance needs of their ...
In a major test case, Japan pursues website owners inserting cryptomining scripts
Japanese police are investigating suspects for illegally inserting cryptomining code onto computers in what could be the first significant test case targeting website owners using the practice worldwide. According to Japanese newspaper Machini, police believe a number of people used other people’s personal computers without permission, setting up websites in fall 2017 to install a program ...
Market manipulation caused surge in prices of bitcoin and other cryptocurrencies, researchers say
A new research paper has confirmed long-held suspicions that the Tether cryptocurrency was used by people linked to the Bitfinex exchange to drive up the price of bitcoin and other cryptocurrencies last year. The paper, written by University of Texas Professor John Griffin, who is known for catching fraud in financial markets, and graduate student Amin Shams, details ...
Toyota invests $1B into Southeast Asian ride-hailing startup Grab
Toyota Motor Corp. is the latest investor in Southeast Asian ride-hailing startup Grab Taxi Pte. Ltd., investing $1 billion into the company to strengthen their existing partnership and expand the collaboration between them. As part of the deal announced today, a Toyota executive will be appointed to Grab’s board of directors and a dedicated Toyota team member will be ...
Reports: New Microsoft Surface Pro coming next year, budget model later this year
Microsoft Corp. will not launch a major upgrade to its Surface-brand personal computers until next year but may release a new, lower-priced model before then, according to new reports. Brad Sams at Thurott.com Tuesday claimed to have seen internal Microsoft documents detailing plans for the Surface range including previously unknown code names for upcoming products. First up is ...
Cryptocurrency malware now targeting Amazon devices as Monero mining surges
Amazon.com Inc.’s Fire devices are being targeted by a new variant of cryptomining malware as a new report shows that mining for Monero, the cryptocurrency of choice for hackers, is surging. The malware is a variant of the ADB.Miner malware that previously targeted stock Android devices (Amazon runs a customized version of Android). It uses the ...
Mac security vulnerability via outside apps opened the door to hacking
A security flaw in the way outside applications tie into an Apple Inc. application programming interface in versions of Mac operating system code, going back more than a decade, has been revealed for the first time. Discovered by researchers at identity management firm Okta Inc., the flaw is described as a bypass ability found in ...









