article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

” “At present, pre-installed partners cover the entire mobile phone industry chain, including mobile phone chip manufacturers, mobile phone design companies, mobile phone brand manufacturers, mobile phone agents, mobile terminal stores and major e-commerce platforms,” reads a descriptive blurb about the company.

Cloud 253
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

” “At present, pre-installed partners cover the entire mobile phone industry chain, including mobile phone chip manufacturers, mobile phone design companies, mobile phone brand manufacturers, mobile phone agents, mobile terminal stores and major e-commerce platforms,” reads a descriptive blurb about the company.

Cloud 169
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fujitsu Introduces New Image Processing Technology on fi-8000 Series Scanners

Info Source

Introduced in 2013, the fi-7160 has been the top-selling model in Infosource’s Departmental segment. With the fi-8170, Fujitsu has reduced its manufacturing costs, as well as the device footprint which enables the new model to remain price competitive and provide users a powerful scanner solution on their desktop.

article thumbnail

Fujitsu Introduces New Image Processing Technology on fi-8000 Series Scanners

Info Source

Introduced in 2013, the fi-7160 has been the top-selling model in Infosource’s Departmental segment. With the fi-8170, Fujitsu has reduced its manufacturing costs, as well as the device footprint which enables the new model to remain price competitive and provide users a powerful scanner solution on their desktop.

article thumbnail

Chinese Ministry Issues New Rule Restricting Pre-Installation of Software by Manufacturers of Mobile Devices

Hunton Privacy

In April 2013, the Ministry of Industry and Information Technology of the People’s Republic of China (the “MIIT”) issued a new rule entitled the “Notice on Strengthening the Administration of Networked Smart Mobile Devices” (the “Notice”). Read our previous coverage on the latest developments in China.

article thumbnail

What dogs can teach companies about privacy and security

Data Protection Report

The case began when a home improvement company that installs “invisible fences” (electronic fences that emit signals to keep dogs within the fence boundaries) sought to obtain the names and addresses of dog owners in Jersey City, New Jersey, so that he could send marketing materials to them. 237 (2013)). Harris , 568 U.S.

Privacy 139
article thumbnail

Are We Prepared for the Rise of Automation?

AIIM

A great proportion of the six million US manufacturing jobs that have disappeared over the last few decades were lost as a direct result of automation’s slow absorption of physical labor and factory work. Increasingly, trading on the stock market is becoming automated. We are barreling toward a future of automation. Conclusion.