Remove Computer and Electronics Remove Data Privacy Remove Military Remove Phishing
article thumbnail

Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?

The Security Ledger

. » Related Stories Episode 100: Estonia’s Former CIO talks about engineering a secure electronic vote Fitness apps: Good for your health, not so much for military security Episode 101: The Dystopian IoT looks a lot like the Printer Ink Aisle and City of Atlanta Employees phished on Rogue Wi-Fi.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Quantum computing attacks already present a real threat to existing standards, making the continued development of encryption pivotal for years to come. Application developers managing sensitive user data must especially beware of increasing regulatory action surrounding data privacy. The Move to HTTPS.

article thumbnail

List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached

IT Governance

Outsourcing group Interserve is recovering after hackers steal employee data (100,000). Spear phishing campaign compromises executives in finance industry (150). Russian military accessed Chancellor Angela Merkel’s emails in 2015 hack (unknown). Data breaches. million over ‘false’ data privacy claims.