Remove Computer and Electronics Remove Cybersecurity Remove Data breaches Remove Security
article thumbnail

Acer Philippines disclosed a data breach after a third-party vendor hack

Security Affairs

Acer Philippines disclosed a data breach after employee data was leaked by a threat actor on a hacking forum. Acer Philippines confirmed that employee data was compromised in an attack targeting a third-party service provider. ‘ph1ns’ published a link to a database containing stolen data.

article thumbnail

Security Affairs newsletter Round 463 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Delta Electronics, a tech giants’ contractor, hit by Conti ransomware

Security Affairs

Delta Electronics, a Taiwanese contractor for multiple tech giants such as Apple, Dell, HP and Tesla, was hit by Conti ransomware. Taiwanese electronics manufacturing company Delta Electronics was hit by the Conti ransomware that took place this week. ” states the data breach notification published by the company.

article thumbnail

UK Pensions briefing: Cybersecurity for pension schemes – where are we now?

Data Protection Report

Our publication Taking action on pension scheme cybersecurity set out the main cyber threats and outlined the steps that trustees could and should take to protect their schemes’ and members’ interests. Cybersecurity – why is it essential? Pension scheme trustees have been aware of the need for cybersecurity for some time now.

article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

On December 3, 2018, twelve attorneys general (“AGs”) jointly filed a data breach lawsuit against Medical Informatics Engineering and its subsidiary, NoMoreClipboard LLC (collectively “the Company”), an electronic health records company, in federal district court in Indiana. See Indiana v. Informatics Eng’g, Inc. , filed Dec.

article thumbnail

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. The same goes with the advent of Quantum Computing , which is supposed to bring exponential computing power that shall not only bring endless benefits but also raises question marks on the current state of cryptography that is the bedrock of all information security as we know today.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Table of Contents What Are the Cybersecurity Risks of 5G? What Are the Cybersecurity Risks of 5G? Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems. There are no secure implementation guides or standards for network operators.

Risk 136