article thumbnail

Information Security vs Cyber Security: The Difference

IT Governance

You’ll often see the terms cyber security and information security used interchangeably. That’s because, in their most basic forms, they refer to the same thing: the confidentiality, integrity and availability of information. What is information security? There are two sub-categories of information security.

article thumbnail

Acer Philippines disclosed a data breach after a third-party vendor hack

Security Affairs

Acer Philippines disclosed a data breach after employee data was leaked by a threat actor on a hacking forum. Acer Philippines confirmed that employee data was compromised in an attack targeting a third-party service provider. The hacked third-party company manages the Acer employee attendance data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Delta Electronics, a tech giants’ contractor, hit by Conti ransomware

Security Affairs

Delta Electronics, a Taiwanese contractor for multiple tech giants such as Apple, Dell, HP and Tesla, was hit by Conti ransomware. Taiwanese electronics manufacturing company Delta Electronics was hit by the Conti ransomware that took place this week. ” states the data breach notification published by the company.

article thumbnail

Maze ransomware operators claim to have breached LG Electronics

Security Affairs

Maze ransomware operators claims to have breached the South Korean multinational electronics company LG Electronics. Researchers at Cyble discovered a data leak of LG Electronics published by Maze ransomware operators. ” reads the post published by Cyble. . ” reads the post published by Cyble.

article thumbnail

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. The same goes with the advent of Quantum Computing , which is supposed to bring exponential computing power that shall not only bring endless benefits but also raises question marks on the current state of cryptography that is the bedrock of all information security as we know today.

article thumbnail

U.S. and Australian police arrested Firebird RAT author and operator

Security Affairs

The Australian man faces twelve counts of computer offenses. The RAT allowed customers to access and control their victims’ computers remotely, its author advertised its stealing capabilities. “ According to the indictment, Chakhmakhchyan engaged in electronic communication with buyers after advertising the Hive RAT. .

article thumbnail

Do you know the difference between cyber security and information security?

IT Governance

You often see people use the terms ‘ cyber security ’ and ‘ information security ’ interchangeably. That’s because, in their most basic forms, they refer to the same thing: the integrity and confidentiality of information. Information security. There are two sub-categories of information security.