Remove Consumer Protection Remove Document Remove Surveillance
article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

That surveillance has helped to paint a detailed picture of how business ID thieves operate, as well as the tricks they use to gain credit in a company’s name. Another team member works on revising the business documents and registering them on various sites. For the past several months, Milwaukee, Wisc.

article thumbnail

FTC bans SpyFone and its CEO from continuing to sell stalkerware

Malwarebytes

Wednesday’s enforcement action represents a much firmer stance from the FTC compared to the settlement it reached in 2019 , when the government agency refrained from even using the term “stalkerware” and it focused more on lacking cybersecurity protections within the apps it investigated, not on the privacy invasions that were allowed.

article thumbnail

Overcoming Compliance Challenges in Cryptocurrency Regulations

Responsible Cyber

Research shows that only 19 out of 60 countries have detailed regulations that cover taxation, AML/CFT, consumer protection, and licensing [1]. Policy Development and Documentation AML policies need clear documentation that spells out specific controls and procedures. Different countries follow different approaches.