Remove 07
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

com — were seen as early as 2016 as distribution points for the Hummer Trojan , a potent strain of Android malware often bundled with games that completely compromises the infected device. com 2016-02-18 ALIBABA CLOUD COMPUTING (BEIJING) CO., net 2010-11-22 ALIBABA CLOUD COMPUTING (BEIJING) CO., For example, 2333youxi[.]com

Cloud 252
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

com — were seen as early as 2016 as distribution points for the Hummer Trojan , a potent strain of Android malware often bundled with games that completely compromises the infected device. com 2016-02-18 ALIBABA CLOUD COMPUTING (BEIJING) CO., net 2010-11-22 ALIBABA CLOUD COMPUTING (BEIJING) CO., For example, 2333youxi[.]com

Cloud 168
article thumbnail

The Burden of Privacy In Discovery

Data Matters

To pick just two recent examples of the latter, the EU’s General Data Protection Regulation1 (GDPR) and the California Consumer Privacy Act2 (CCPA) both impose sweeping requirements on businesses with the aim of increasing consumers’ privacy and control over how their personal data is used. For example, in John B.

Privacy 97