Remove Consumer Protection Remove Data breaches Remove Technology
article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers.

Mobile 357
article thumbnail

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

The Last Watchdog

They point out how supply chains rely on software yet lack the security tools to protect them. Data breaches exposed over 37 billion records in 2020 alone — a 141% jump from 2019. Businesses must automatically secure their supply chains to protect themselves and comply with consumer-protection laws.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

12 Online Resolutions for 2021

Adam Levin

Do your homework and find a VPN service with a solid reputation for their privacy, security, and data retention policies. Unfortunately, this means that a single poorly-secured personal device can lead to a large-scale data breach. Always check your credit for new accounts or unusual activity.

VPN 245
article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

HIPAA also requires organizations to conduct regular risk assessments and report data breaches. Recent updates to HIPAA regulations may address new technologies and evolving threats in the healthcare industry. The act also covers various forms of cybercrime, including malware distribution and data theft.

article thumbnail

Scary Fraud Ensues When ID Theft & Usury Collide

Krebs on Security

Then in mid-January, Jim heard from MSF via snail mail that they’d discovered a data breach. ” Bailey said in one common type of arrangement, the lender provides the necessary capital, expertise, staff, technology, and corporate structure to run the lending business and keeps most of the profits.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Over the past year, the Telecom industry has suffered some massive, high-profile data breaches — all of which happened by exploiting unprotected APIs. These include breaches on major operators such as T-Mobile. Legacy Technology Clashes : Most Telcos have very large legacy IT footprints.

article thumbnail

New Federal Privacy Law Legislation Introduced

SecureWorld News

According to a statement from DelBene, 70% of Americans believe their data is less secure now than it was five years ago, and 45% say they had their personal information compromised in a data breach with limited to no accountability for those responsible. Tom Quaadman, Executive Vice President at the U.S.