Yahoo CEO Marissa Mayer delivers the keynote address at the Yahoo Mobile Developer Conference in San Francisco on Feb. 18, 2016. The drama that is the coming proxy battle at Yahoo may take three months or more to play out. After that, the clamor could increase between Yahoo and activist hedge fund Starboard Value, a shareholder that is looking to overthrow the current board and oust CEO Marissa Mayer. After that you can likely expect "some colorful, critical fight letters coming out concurrent with ... the final proxy statements getting cleared and sent out to Yahoo! stockholders," said Bill Poudrier, president of The Proxy Advisory Group. He discussed the situation with USA TODAY Monday after participating in a conference call Friday about Yahoo and the Starboard Value proxy battle with Robert Peck, Internet equity analyst at SunTrust Robinson Humphrey.
A machine learning model may exhibit discrimination when used to make decisions involving people. One potential cause for such outcomes is that the model uses a statistical proxy for a protected demographic attribute. In this paper we formulate a definition of proxy use for the setting of linear regression and present algorithms for detecting proxies. Our definition follows recent work on proxies in classification models, and characterizes a model's constituent behavior that: 1) correlates closely with a protected random variable, and 2) is causally influential in the overall behavior of the model. We show that proxies in linear regression models can be efficiently identified by solving a second-order cone program, and further extend this result to account for situations where the use of a certain input variable is justified as a business necessity''.
A report published by Akamai detected those threat actors were abusing at least 65,000 routers to create proxy networks for various illegal activities. According to the company's report, the attackers are using UPnP to create proxy networks for various illegal activities. Despite UPnP being crucial for every modern router, the protocol has proven to be insecure with most malware authors having used UPnP flaws. The Hackers are using misconfigured UPnP services to inject malicious routes inside the network address translation tables, NAT is a set of rules that control how IP's and ports from the router's internal networks are mapped to the external networks. Custom NAT if not configured properly provides easy access to the network using the router's public IP on a specific port, this flaw allows attackers to use routers with misconfigured UPnP services as proxy servers for their operations.