Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

2/14/2008
08:05 PM
Terry Sweeney
Terry Sweeney
Commentary
Connect Directly
Facebook
Twitter
RSS
E-Mail
50%
50%

'Pleased To Put This Matter Behind Us'

As a journalist, it makes me wince to witness reporters getting all sanctimonious when in reality they're doing little more than burnishing their reputations. But the roles got reversed as Hewlett-Packard settled one of two sets of pretexting and spying claims yesterday, acting and speaking with a smugness and neutrality that don't really put the matter behind anyone.

As a journalist, it makes me wince to witness reporters getting all sanctimonious when in reality they're doing little more than burnishing their reputations. But the roles got reversed as Hewlett-Packard settled one of two sets of pretexting and spying claims yesterday, acting and speaking with a smugness and neutrality that don't really put the matter behind anyone.Click here if you need a refresher on the whole shameful affair of how one of the industry's largest IT and storage companies went to extremes to find the source(s) of leaks, which in turn swept through its executive offices like a white tornado. There's little question at this point that what HP did was illegal. If nothing else, fraud and deceit are simply bad behavior. So to watch the company fumble the settlement (and its PR) heaps a bit more fuel on the flame.

Maybe a posture of contrition isn't a corporate article of faith; maybe it was more critical from HP's perspective to admit to no wrong-doing, or maybe as an institution it's had it up to here with the mea culpas.

In this instance, the two sides have been negotiating since December 2006. The journalists' attorney reported that the resolution was "hard fought." Maybe it was the amount of money (still undisclosed) or how much, if any, of the settlement the aggrieved parties would keep.

"The matter has been resolved to the mutual satisfaction of the parties, and we're pleased to put this matter behind us," an HP spokesperson said in this account, with this needless addendum: "HP also is pleased that the journalists decided to donate all or some portion of the settlement to charity, although HP was not consulted about the charities selected."

HP's going to play the etiquette card now? It's kind of like yelling at a homeless person who fails to consult you on where to spend the dollar you just gave him for dinner.

Clearly, the thinly veiled snideness here masks no small amount of acrimony, whatever the reason or source. In speaking publicly about this settlement, HP had a real chance to behave and speak with some class to restore some of its reputation. Maybe it will drop this tone when it comes times to settle a pending complaint with a second group of journalists. It seems like a small step to start putting this episode behind HP.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16863
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
CVE-2019-18949
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
CVE-2011-1930
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
CVE-2011-1145
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
CVE-2011-1488
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...