Guess how much Facebook pays for its CEO Mark Zuckerberg’s security

Agencies
April 13, 2019

Facebook Inc more than doubled the money it spent on Chief Executive Officer Mark Zuckerberg’s security in 2018 to $22.6 million, a regulatory filing showed on Friday.

Zuckerberg has drawn a base salary of $1 for the past three years, and his “other” compensation was listed at $22.6 million, most of which was for his personal security.

Nearly $20 million went toward security for Zuckerberg and his family, up from about $9 million the year prior. Zuckerberg also received $2.6 million for personal use of private jets, which the company said was part of his overall security program.

Facebook has in the past few years faced public outcry over its role in Russia’s alleged influence on the 2016 US presidential election and has come under fire following revelations that Cambridge Analytica obtained personal data from millions of Facebook profiles without consent.

Chief Operating Officer Sheryl Sandberg took home $23.7 million in 2018 compared to $25.2 million last year.

Separately, Facebook said Netflix Chief Executive Officer Reed Hastings would vacate his seat on the social media company’s board and not be nominated for re-election.

Hastings’ departure comes as the Menlo Park-based company beefs up its push into videos. Hastings has served on Facebook’s board since 2011.

The company also said it would nominate PayPal’s senior vice president of core markets, Peggy Alford, to its board in place of University of North Carolina President Emeritus Erskine Bowles, who will also not be re-nominated.

Facebook shares closed at $179.07 Friday evening.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 27,2020

New Delhi, Jul 27: India's COVID tally on Monday crossed 14 lakh mark with the highest single-day spike of 49,931 cases reported in the last 24 hours, said the Union Ministry of Health and Family Welfare.

The total COVID-19 cases stand at 14,35,453, including 4,85,114 active cases, 9,17,568 cured/discharged/migrated, it added.

With 708 deaths in the last 24 hours, the cumulative toll reached 32,771.

India had crossed 13 lakhs COVID-19 cases on July 25.

Maharashtra has reported 3,75,799 coronavirus cases, the highest among states and Union Territories in the country.

A total of 2,13,723 cases have been reported from Tamil Nadu till now, while Delhi has recorded a total of 1,30,606 coronavirus cases.

According to the Indian Council of Medical Research (ICMR), 5,15,472 samples were tested for coronavirus on Sunday and overall 1,68,06,803 samples have been tested so far.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 7,2020

New Delhi, Jan 7: When a reign of terror was unleashed by "masked goons" in the Jawaharlal Nehru University (JNU) on Sunday, Delhi Police registered two cases against varsity students union president Aishe Ghosh, who was badly injured in the attack, within a span of five minutes.

The registration of cases on two separate complaints against Ghosh and other students filed by JNU security department on January 3 and January 4 were registered on Sunday night when the violence was on, triggering questions about the motive behind the timing.

While the FIRs against Ghosh and others were registered between 8.44 pm and 8.49 pm after the JNUSU president was admitted to AIIMS, an FIR on the Sunday violence was registered on Monday at 5.36 am against unknown persons. The Sunday violence case has been transferred to Crime Branch for further investigations.

Questions are being raised over the registration of FIRs on Sunday while the complaints were filed on the previous days. Students allege that it was an afterthought from the police and authorities, as a nationwide outrage erupted as soon as the violence was reported.

Delhi Police is under attack for not coming to the aid of students targeted by the mob of ABVP activists armed with iron rods and sticks who went on a rampage on the campus. While no single person in the Sunday violence was arrested, the police are also accused of being a "mute spectator" by allowing the rioters to leave the campus without being arrested.

In its complaints, the JNU Security Department has alleged that Ghosh and others entered into a verbal and physical scuffle with security guards, including women, when officials tried to open the Centre for Information System (CIS) that was blocked by students protesting against the fee hike and registration process.

While the January 3 complaint claims that the students switched off the power supply to the CIS and evicted staff forcefully, the January 4 complaint alleged that they damaged the information system.

They also claimed the students damaged the servers, made it dysfunctional, severely damaged optic fibre cables and broke the biometric system in the CIS. The complaint also cited a Supreme Court order that prevented any protest within 100 metres of Administration Block and claimed the students violated the direction.

The FIR filed on Sunday violence on the basis of the statement of Inspector Anand Yadav said that the first phase of violence was reported at 3.45 pm when "40-50 unidentified" people who had "covered their faces" attacked students in Periyar Hostel and the situation was brought under control.

However at around 7 pm, "50-60 people with rods in their hands" targeted students in Sabarmati Hostel in which students were attacked and public property destroyed.

The FIR said that students were injured but skipped the mention of the attack on teachers, who were injured. At least two faculty members Sucharita Sen and Ameet Parameswaran were taken to AIIMS while several other teachers suffered minor injuries.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.