article thumbnail

National Consumer Protection Week: Keeping your personal data safe in a digitally connected world

Webroot

March is a time for leprechauns and four-leaf clovers, and as luck would have it, its also a time to learn how to protect your private data from cybercrime. Each year, the first week of March (March 2-8) is recognized as National Consumer Protection Week (NCPW).

article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

The Blacklist Alliance provides technologies and services to marketing firms concerned about lawsuits under the Telephone Consumer Protection Act (TCPA), a 1991 law that restricts the making of telemarketing calls through the use of automatic telephone dialing systems and artificial or prerecorded voice messages.

Mobile 357
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New IoT Security Regulations

Schneier on Security

Consumers will buy products without proper security features, unaware that their information is vulnerable. And current liability laws make it hard to hold companies accountable for shoddy software security. It falls upon lawmakers to create laws that protect consumers. But software is different.

IoT 262
article thumbnail

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

The Last Watchdog

They point out how supply chains rely on software yet lack the security tools to protect them. Businesses must automatically secure their supply chains to protect themselves and comply with consumer-protection laws. Simply put, cyberattacks are on the rise. Scalability. Ongoing monitoring.

article thumbnail

The CPRA: What You Should Know as an InfoSec Professional

SecureWorld News

Spirion, leads the discussion, which includes: A comparison of the CCPA and CPRA with other state privacy protection regulations, including the Virginia Consumer Data Protection Act, Colorado Privacy Act, Connecticut Data Protection Act, and Utah Consumer Privacy Act. Training for employees (awareness).

InfoSec 98
article thumbnail

Indiana sues TikTok, describes it as "Chinese Trojan Horse"

Malwarebytes

The second suit claims that TikTok violated consumer protection laws by not disclosing that China has access to sensitive user data. TikTok is a wolf in sheep's clothing," court documents read, echoing what Federal Communications Commission (FCC) Chairman Brendan Carr said about TikTok back in July.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. APIs are software intermediaries that enable two software components to communicate with each other. What are APIs?