Remove Consumer Protection Remove Data breaches Remove Technology
article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers.

Mobile 357
article thumbnail

Legal Zero-Days: How Old Laws Became a Novel Loss Generator

SecureWorld News

The latest wave of privacy litigation doesn't involve data breaches, AI models, or spyware. Companies across industries are being sued for using widely available web technologies: session replay tools, analytics platforms, and advertising trackers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

The Last Watchdog

They point out how supply chains rely on software yet lack the security tools to protect them. Data breaches exposed over 37 billion records in 2020 alone — a 141% jump from 2019. Businesses must automatically secure their supply chains to protect themselves and comply with consumer-protection laws.

article thumbnail

12 Online Resolutions for 2021

Adam Levin

Do your homework and find a VPN service with a solid reputation for their privacy, security, and data retention policies. Unfortunately, this means that a single poorly-secured personal device can lead to a large-scale data breach. Always check your credit for new accounts or unusual activity.

VPN 245
article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

HIPAA also requires organizations to conduct regular risk assessments and report data breaches. Recent updates to HIPAA regulations may address new technologies and evolving threats in the healthcare industry. The act also covers various forms of cybercrime, including malware distribution and data theft.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Over the past year, the Telecom industry has suffered some massive, high-profile data breaches — all of which happened by exploiting unprotected APIs. These include breaches on major operators such as T-Mobile. Legacy Technology Clashes : Most Telcos have very large legacy IT footprints.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

GDPR, the EU’s flagship data privacy and “right to be forgotten” regulation, has made the stakes of a data breach higher than ever. Health data and patient data in the U.S. Financial Data Protection Laws. In the U.S.,