Bose Work Remote Promo
Bose Work Remote Mobile Promo
Take Our Survey on Your IoT/Collaboration Plans & You Could Win a 60" 4K UHD Display!
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Downloads
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

Who Got Hacked This Week? May 26 Edition

What types of cyberattacks were carried out this week, May 26, 2020? Read on to find out about the latest cyberattacks and who got hacked this week.

May 26, 2020 Jonathan Blackwood Leave a Comment

Photos & Slideshow
View the slideshow View the slideshow
View Slideshow

Each week, TechDecisions brings you the latest cyber security news on cyberattacks and who got hacked from around the internet.

Cyber security is becoming a main issue for many companies, and our weekly feature is a good example of why.

Every week there are multiple stories of people, businesses, and products being hacked for fun, for money, and sometimes for evil.

Luckily for you, knowing the enemy is half the battle. In order to prevent getting hacked in the future, you need to understand who got hacked in the past. Cyber security is a constantly evolving threat to any organization, and even individuals.

Make sure to check out a couple of pieces of content to gain a better understanding of cyber security, and how cyberattacks are carried out.

  • The Ultimate Guide to Corporate Cyber Security– Cyber security can be confusing, but after reading our article you’ll be in the clear and ready to stay safe.
  • How Does a Cyber Attack Work?– Hacking and cyberattacks are threats that should concern every company. Here’s how they work.
  • What is the Worst Case Scenario for Cyber Attacks?– Cyberattacks can have serious implications at the individual, company, and country-wide level.

After reading these pieces of content you’ll understand how cyber security works and get a better idea of how these weekly cyberattacks are working. Only by being equipped with the right information can any organization hope to protect themselves against the constant threats out there.

Each week we’ll be sure to get you the information so you know what cyberattacks are going on around the country and around the world.

This week includes:

  • Forty million users of voting app Wishbone exposed in hack
  • Nine million users of EasyJet have data stolen in hack
  • Hackers figure out how to hack Apple iOS 13.5
  • And more!

Click here to find out who got hacked this week, May 26, 2020.

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Cyber Attacks, Cyber Security

Related Content:

  • IBM Siemens Red hat Hybrid Cloud IBM, Siemens, Red Hat Collaborate On Hybrid Cloud…
  • SolarWinds Cyber Incident Costs SolarWinds Expects Cyber Incident Costs Up To $25…
  • return to office technology solutions and strategies Visualizing the Hybrid Office
  • Sielox, school IT departments What School IT Departments Should Focus On to…

Free downloadable guide you may like:

  • Introducing the IT Pro MBA: Vetting Technology

    At some point in your career there is going to come a time when you are tasked with reviewing and vetting new tech to implement into your company. Sometimes the hardest part of the whole thing is just getting started. In this new series from My TechDecisions, the IT Pro MBA: Vetting Technology guide deep-dives […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Introducing the IT Pro MBA: Vetting Technology

At some point in your career there is going to come a time when you are tasked with reviewing and vetting new tech to implement into your company. ...

9 Technology Products to Help Combat COVID-19 Spread in the Workplace

As the Coronavirus continues on and leads us further into uncertainty, the question remains, “when do we return to the office?” For some the answer...

Top 9 Reasons Enterprise IT Leaders Are Moving Their Video Surveillance to the Eagle Eye Cloud

Working in IT has enough challenges without adding in the complications of surveillance video. Things like total cost of maintenance, how the VMA m...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2021 Emerald X, LLC. All rights reserved.