Remove 09
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

com — were seen as early as 2016 as distribution points for the Hummer Trojan , a potent strain of Android malware often bundled with games that completely compromises the infected device. com 2016-02-18 ALIBABA CLOUD COMPUTING (BEIJING) CO., net 2010-11-22 ALIBABA CLOUD COMPUTING (BEIJING) CO., For example, 2333youxi[.]com

Cloud 254
article thumbnail

Who’s Behind the ‘Web Listings’ Mail Scam?

Krebs on Security

has posts dating back to 2010, and points to even more Web Listings domains, including weblistingsinc.org. 2010 to a Mark Scott in Blairgowrie, Scotland, using the email address clientnews@reputationmanagementfor.com. .” As we’ll see, Mark is a name that comes up quite a bit in this investigation. as a business partner.

Sales 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

com — were seen as early as 2016 as distribution points for the Hummer Trojan , a potent strain of Android malware often bundled with games that completely compromises the infected device. com 2016-02-18 ALIBABA CLOUD COMPUTING (BEIJING) CO., net 2010-11-22 ALIBABA CLOUD COMPUTING (BEIJING) CO., For example, 2333youxi[.]com

Cloud 169
article thumbnail

The Burden of Privacy In Discovery

Data Matters

To pick just two recent examples of the latter, the EU’s General Data Protection Regulation1 (GDPR) and the California Consumer Privacy Act2 (CCPA) both impose sweeping requirements on businesses with the aim of increasing consumers’ privacy and control over how their personal data is used. For example, in John B.

Privacy 97