Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

3/3/2017
09:27 AM
50%
50%

Yahoo CEO Punished for Data Breaches

Marissa Mayer will be denied her annual bonus of around $2 million and also forgoes annual stock award worth millions.

Yahoo CEO Marissa Mayer will pay a penalty for the two breaches the company suffered in 2013 and 2014 by being denied her annual bonus of around $2 million and forgoing her annual stock award worth millions of dollars, Fox News reports. Yahoo’s general counsel Ronald Bell too was punished, having to resign without getting his severance pay.

An internal investigation into the breaches has held the executives responsible for failing to conduct a deep probe into the security lapses once revealed, alleging the executives “failed to act sufficiently.” The report also called out the legal department for failing to act immediately, which caused the breaches to not be “properly investigated and analyzed at the time.”

The data breaches, reported by Yahoo in 2016, compromised over 1 billion user accounts and cost the company $350 million after Verizon reduced its takeover deal price. Over 40 lawsuits have been filed against the company and the SEC and FTC are investigating the incidents.

In her defense, Mayer says she tried to set things right as soon as she learnt about the breaches.

Full story on Fox News.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NachoV
50%
50%
NachoV,
User Rank: Apprentice
6/20/2017 | 5:56:53 AM
Re: followers
YOur post has intersting and unique information. THanks
followersinsta
100%
0%
followersinsta,
User Rank: Apprentice
3/3/2017 | 6:17:52 PM
followers
With the amount of data that is affected in a breach, this penalty is very resonable
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
3/3/2017 | 2:51:54 PM
Breaches Affect Acquisitions
This is a perfect example of how breaches and security related events can affect acquisitions. This is where the practice of using market data to justify the potential direct cost of these events can be useful and in the long run save the company money.
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "SpearPhish! Everyone out of the office!"
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-1919
PUBLISHED: 2019-07-17
A vulnerability in the Cisco FindIT Network Management Software virtual machine (VM) images could allow an unauthenticated, local attacker who has access to the VM console to log in to the device with a static account that has root privileges. The vulnerability is due to the presence of an account w...
CVE-2019-1920
PUBLISHED: 2019-07-17
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling conditi...
CVE-2019-1923
PUBLISHED: 2019-07-17
A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by access...
CVE-2019-1940
PUBLISHED: 2019-07-17
A vulnerability in the Web Services Management Agent (WSMA) feature of Cisco Industrial Network Director (IND) could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid X.509 certificate. The vulnerability is due to insufficient X.509 certifi...
CVE-2019-1941
PUBLISHED: 2019-07-17
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because th...