Remove Consumer Protection Remove Data breaches Remove Firewall
article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers.

Mobile 357
article thumbnail

SiteLock’s Top Five Cybersecurity Predictions For 2020

SiteLock

It’s safe to say that the volume and magnitude of high-profile data breaches and ransomware attacks that punctuated 2019 really kept the cybersecurity industry on its toes. Data breaches stole numerous headlines this year, including the notable Capital One breach that exposed more than 100 million customers’ accounts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

HIPAA also requires organizations to conduct regular risk assessments and report data breaches. Children’s Online Privacy Protection Act (COPPA) The Children’s Online Privacy Protection Act (COPPA) regulates the collection of personal information from minors to protect the privacy of children under 13.

article thumbnail

It’s a Holiday Security Breach Blowout

SiteLock

It’s a heartwarming tale of multiple mass data compromises, which affected yours truly. We’ll also discuss how major data breaches occur, and what you can do to protect yourself in the Age of the Large Data Breach. How Website Security Breaches Occur. Last week was special.

article thumbnail

IRS Warns About New Cyber Scam Targeting Taxpayers

Privacy and Cybersecurity Law

Use security software with firewall and anti-virus protections, and ensure the security software is always turned on and can automatically update. To mitigate against this threat, the IRS recommended that taxpayers and businesses that store taxpayer information take three steps: Use Security Software.

Scams 40