Key events in the evolution of the social networking phenomenon January 2004Official site launch of MySpaceFebruary 2004 1 million members November 2004 5 million members October 2005 $580 million acquisition by News CorporationMay 2006 Hemanshu Nigam hired as CSOJune 2006 80 million members • MySpace announces it will block adults from contacting 14- and 15-year-olds without knowing their e-mail address or full name, make privacy settings available for all users, and block alcohol and tobacco ads for underage users August 2006 100 million membersOctober 2006 • Wired reports that hundreds of registered sex offenders have created MySpace pages using their own names December 2006 135 million members • Worm using QuickTime exploit spreads through MySpace • MySpace announces a plan for blocking convicted sex offenders from the siteJanuary 2007 • Four families sue MySpace, claiming their underage daughters were sexually abused by adults they met on the site • MySpace announces that it’s developing free software that parents can use to monitor public information their children post at the siteFebruary 2007 150 million members Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe