article thumbnail

Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?

The Security Ledger

» Related Stories Episode 100: Estonia’s Former CIO talks about engineering a secure electronic vote Fitness apps: Good for your health, not so much for military security Episode 101: The Dystopian IoT looks a lot like the Printer Ink Aisle and City of Atlanta Employees phished on Rogue Wi-Fi. Read the whole entry. »

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Quantum computing attacks already present a real threat to existing standards, making the continued development of encryption pivotal for years to come. Application developers managing sensitive user data must especially beware of increasing regulatory action surrounding data privacy. The Move to HTTPS.

article thumbnail

List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached

IT Governance

Russian military accessed Chancellor Angela Merkel’s emails in 2015 hack (unknown). Data breaches. Advanced Computer Software Group exposed data of 190 law firms (10,000). Authorities investigating data breach at Poland’s SWPS University (unknown). million over ‘false’ data privacy claims.