Remove 01
Remove 2016 Remove Blog Remove Data breaches Remove Security
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

com — were seen as early as 2016 as distribution points for the Hummer Trojan , a potent strain of Android malware often bundled with games that completely compromises the infected device. com 2016-02-18 ALIBABA CLOUD COMPUTING (BEIJING) CO., net 2014-01-20 ALIBABA CLOUD COMPUTING (BEIJING) CO., com , buydudu[.]com

Cloud 254
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

com — were seen as early as 2016 as distribution points for the Hummer Trojan , a potent strain of Android malware often bundled with games that completely compromises the infected device. com 2016-02-18 ALIBABA CLOUD COMPUTING (BEIJING) CO., net 2014-01-20 ALIBABA CLOUD COMPUTING (BEIJING) CO., com , buydudu[.]com

Cloud 169
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New European Cyber Laws – Do you understand potential impact on your business?

CGI

Thu, 01/14/2016 - 05:54. I read a recent article in the FT, Network and Information Security Directive (NISD), also known as the Cyber Security Directive, was agreed on the 8th December, followed a week later by the General Data Protection Regulation (GDPR ), agreed on the 15th December. ravi.kumarv@cgi.com.

GDPR 40
article thumbnail

Cybersecurity is everyone’s responsibility

CGI

Thu, 01/07/2016 - 04:32. As a result, keeping this information secure has become a focal point for organizations. As a result, keeping this information secure has become a focal point for organizations. It’s important to understand cybersecurity is not like “normal” security. kathy.jacquay@…. Add new comment.