Remove 12
article thumbnail

Who’s Behind the ‘Web Listings’ Mail Scam?

Krebs on Security

One from May 2011 at onlineprnews.com sings the praises of Weblistingsinc.info , weblistingsinc.org and web-listings.net in the same release, and lists the point of contact simply as “Mark.” Cached versions of this site from 2011 show it naming Web Listings Inc. as a business partner. That same management@helpmego.to

Sales 262
article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This is the second post of a series dedicated to the hunt and takedown of Gooligan that we did at Google, in collaboration with Check Point, in November 2016. since at least 2011. For example, DroidDream. back in 2011. For example, recently NSA-leaked exploit. first post. final post. Android malware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This is the second post of a series dedicated to the hunt and takedown of Gooligan that we did at Google, in collaboration with Check Point, in November 2016. since at least 2011. For example, DroidDream. back in 2011. For example, recently NSA-leaked exploit. first post. Android malware. RageAgainstTheCage.

article thumbnail

Predictions 2016: Apple, Tesla, Google, Medium, Adtech, Microsoft, IoT, and Business on a Mission

John Battelle's Searchblog

The post Predictions 2016: Apple, Tesla, Google, Medium, Adtech, Microsoft, IoT, and Business on a Mission appeared first on John Battelle's Search Blog. it was really you who’ve encouraged me to have at it again for 2016. 2016 will be the year that “business on a mission” goes mainstream.

IoT 75
article thumbnail

UK: How real is the threat of data protection group litigation in the UK?

DLA Piper Privacy Matters

In the run up to the implementation of the EU General Data Protection Regulation 2016/679, there were various dystopian predictions of huge fines and the rise of US style class action. For example, a casual internet user may be less distressed by Google’s activities than a heavy internet user.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Listen to EP 12: Hacking Healthcare. For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. Apple Podcasts. Google Podcasts.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Listen to EP 12: Hacking Healthcare. For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. Apple Podcasts. Google Podcasts.

IT 52