Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Public

US and EU approve Googles buyout of Motorola

Paul Anderson by Paul Anderson
February 14, 2012 - Updated on February 23, 2012
in Public, Technology News
5
Google motorola logo
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Google motorola logo

You might also like

Silent OS 3.0 for Blackphone Completely revamped

Megaupload Plans to Return After 5 Years

Exploit Kit activity on a steep decline since April

The US Department of Justice (DOJ) has just okayed Google’s take over of Motorola, and the European committee cleared the deal earlier today. Google however needs the consent of China, Israel, and Taiwan to complete the business deal, but if successful, it will reap a plentiful harvest of mobile patents from Motorola.

Tags: buisnessbuyoutgooglemobileMotorola
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Silent OS 3.0 for Blackphone Completely revamped

by Paul Anderson
July 24, 2016 - Updated on May 17, 2022
1
Silent OS 3.0 for Blackphone Completely revamped

Version 3.0 migrates Silent OS to Android Marshmallow 6.0.1 and delivers the Android safety patch level to June 2016. Along with fixes for security vulnerabilities, Silent OS 3.0...

Read more

Megaupload Plans to Return After 5 Years

by Paul Anderson
July 15, 2016 - Updated on May 26, 2022
0
Megaupload Plans to Return After 5 Years

The huge file-sharing website, Megaupload is scheduled to relaunch, five years after being raided and shut down by the FBI. After its owner, Kim Dotcom, was detained and...

Read more

Exploit Kit activity on a steep decline since April

by Paul Anderson
July 12, 2016
0
Exploit Kit activity on a steep decline since April

As malware writers are moving to Neutrino and RIG exploit kits (EK) for dispersal needs, security experts are investigating how distribution is innovating, and they are generally signaling a huge...

Read more

EasyDoc malware infects Macs and routes through TOR

by Kyle
July 6, 2016
0
EasyDoc malware infects Macs and routes through TOR

Antivirus company, Bitdefender has released an alert regarding a harmful application that infects Macs and connects to the command-and-control servers via Tor. The program, called EasyDoc Converter.app, claims...

Read more

Hummer malware infecting androids earns $3.5 Million a week

by Paul Anderson
July 6, 2016 - Updated on May 17, 2022
0
Hummer malware infecting androids earns $3.5 Million a week

A new Trojan, named Hummer, has been discovered infecting Android phones. The malware creators are earning an estimated $3,500,000 a week or $500,000 a day say researchers at...

Read more
Next Post

New Waledac botnet strain, now more dangerous

Related News

BreachForums Owner Arrested and Charged

BreachForums Owner Arrested and Charged

March 17, 2023
ChipMixer platform tied to crypto laundering scheme – seized by authorities

ChipMixer platform tied to crypto laundering scheme – seized by authorities

March 17, 2023
NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.