Example collocations logo

Communications in example sentence

Kerr described what he called “supply chain attacks” in which hackers not only steal proprietary information, but go further and insert erroneous data and programs in communications hardware and software – Trojan horses that can be used to bring down systems.
All example sentences