16 Minutes #61: J&J Vaccine Pause; FBI Removes Code in Hacked Exchange Servers

    We have two brief segments in today’s episode: News and analysis of the Johnson & Johnson COVID vaccine pause, and the widespread hack of Microsoft Exchange Servers across the country (and the dramatic and unusual steps the FBI took in response).

    Johnson & Johnson: Federal health officials last week revealed that six women who received the vaccine had developed rare and severe blood clots in their brain, in one case fatally. Even more recently, a panel of expert advisors to the Centers for Disease Control determined that they needed more time to assess the risk of the drug, which was approved by the FDA under Emergency Use Authorization, or EUA.

    Our experts are General Partner Jorge Conde, who previously appeared on our episode about J&J efficacy rates, and General Partner Vineeta Agarwala, who is a practicing clinician at Stanford Hospital and recently joined us on “16 Minutes” with Dr. Bob Wachter of UCSF to analyze the vaccine rollout in the U.S. They tease apart what’s hype and what’s real, addressing the clinical facts about the six J&J cases (and contrast it to the social media conversations and headlines), as well as look at the incidence rate, and what the J&J vaccine shares with the Astra Zeneca vaccine, which has been halted or limited in Europe and elsewhere over similar blood clot concerns.

    FBI and Microsoft Exchange Servers: The Department of Justice recently announced that the FBI, after getting court authorization, had removed malicious code from hundreds of computers running on-premises versions of Microsoft Exchange Server software used to provide email services. In March, Microsoft had announced the initial hack and released detection tools and patches to help owners of the compromised computers, but the latest government announcement revealed that the FBI had taken the step of accessing the private servers and removing the malicious code, in this case web shells that enable remote administration, from computers that had not mitigated the risk. Microsoft has associated the hackers with state-sponsored actors in China.

    Our expert is a16z’s Joel de la Garza, who explains what’s behind this unusual action (including giving context about the decades-long debate over computer security and privacy rights) and where it all fits into larger trends of enterprise security and even national security.

    ###

    The views expressed here are those of the individual AH Capital Management, L.L.C. (“a16z”) personnel quoted and are not the views of a16z or its affiliates. Certain information contained in here has been obtained from third-party sources, including from portfolio companies of funds managed by a16z. While taken from sources believed to be reliable, a16z has not independently verified such information and makes no representations about the enduring accuracy of the information or its appropriateness for a given situation. In addition, this content may include third-party advertisements; a16z has not reviewed such advertisements and does not endorse any advertising content contained therein.

    This content is provided for informational purposes only, and should not be relied upon as legal, business, investment, or tax advice. You should consult your own advisers as to those matters. References to any securities or digital assets are for illustrative purposes only, and do not constitute an investment recommendation or offer to provide investment advisory services. Furthermore, this content is not directed at nor intended for use by any investors or prospective investors, and may not under any circumstances be relied upon when making a decision to invest in any fund managed by a16z. (An offering to invest in an a16z fund will be made only by the private placement memorandum, subscription agreement, and other relevant documentation of any such fund and should be read in their entirety.) Any investments or portfolio companies mentioned, referred to, or described are not representative of all investments in vehicles managed by a16z, and there can be no assurance that the investments will be profitable or that other investments made in the future will have similar characteristics or results. A list of investments made by funds managed by Andreessen Horowitz (excluding investments for which the issuer has not provided permission for a16z to disclose publicly as well as unannounced investments in publicly traded digital assets) is available at https://a16z.com/investments/.

    Charts and graphs provided within are for informational purposes solely and should not be relied upon when making any investment decision. Past performance is not indicative of future results. The content speaks only as of the date indicated. Any projections, estimates, forecasts, targets, prospects, and/or opinions expressed in these materials are subject to change without notice and may differ or be contrary to opinions expressed by others. Please see https://a16z.com/disclosures for additional important information.