Tag Archive for: companies

Malicious malware and ransomware found pre-installed on 38 Android phones by two companies – International Business Times UK


International Business Times UK

Malicious malware and ransomware found pre-installed on 38 Android phones by two companies
International Business Times UK
Security researchers have found a "severe infection" in 38 Android devices belonging to two unidentified companies that were riddled with an assortment of malware. According to security firm Check Point's Mobile Threat Prevention team, the malware were …

and more »

mobile security – read more

WikiLeaks will share CIA hacking details with companies, but can they use it?

WikiLeaks plans to share details about what it says are CIA hacking tools with the tech companies so that software fixes can be developed.

But will software companies want it?

The information WikiLeaks plans to share comes from 8,700-plus documents it says were stolen from an internal CIA server. If the data is classified — and it almost certainly is — possessing it would be a crime.

That was underlined on Thursday by White House press secretary Sean Spicer, who advised tech vendors to consider the legal consequences of receiving documents from WikiLeaks.

To read this article in full or to leave a comment, please click here

Network World Security

[Updated] WikiLeaks Not Ready to Share Code with Tech Companies – Google Says “Many” Leaked Android Flaws … – Wccftech


Wccftech

[Updated] WikiLeaks Not Ready to Share Code with Tech Companies – Google Says “Many” Leaked Android Flaws …
Wccftech
Several independent security researchers have said that the threat to the latest Android versions appears to be minimal. However, unlike iPhones, Android users are mostly slower at getting latest security patches, possibly putting millions of them at

and more »

android security – read more

What cyberinsurance gotchas companies must be ready for – Networks Asia

What cyberinsurance gotchas companies must be ready for
Networks Asia
These plans are designed to spell out the exact steps a company must follow in the aftermath of an attack or data breach. These steps help ensure that the incident is handled in a manner that helps limit the damage caused and reduces recovery time and …

data breach – Google News