Remove Accountability Remove Consumer Protection Remove Identity Theft Remove Risk
article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

This story is about the victims of a particularly aggressive business ID theft ring that’s spent years targeting small businesses across the country and is now pivoting toward using that access for pandemic assistance loans and unemployment benefits. For 2020, the company estimates an overall 258 percent spike in the crime.

article thumbnail

Can “Buy Now, Pay Later” Apps Be Trusted with My Personal Data?

Identity IQ

Recent regulatory insight into buy now, pay later highlights the risks tied to this growing credit option. The Consumer Financial Protection Bureau recently asked several buy now, pay later, or BNPL, providers for information related to some concerns it has about short-term installment plans.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Common Holiday Scams and How to Avoid Them

Identity IQ

These emails may appear to be from legitimate retailers, offering enticing deals or requesting account verification. Many retailers offer secure delivery options, such as in-store pickup or lockers, which help reduce the risk of porch piracy. Never open attachments or click on links in emails from a sender you don’t recognize.

Scams 52
article thumbnail

Me on the Equifax Breach

Schneier on Security

Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". Subcommittee on Digital Commerce and Consumer Protection. The Equifax breach was a serious security breach that puts millions of Americans at risk. And in 2014, the company reported yet another security breach of consumer information.

article thumbnail

What is Maryland’s Online Data Privacy Protection Act?

Centraleyes

Response to Consumer Requests and Data Protection Assessments Controllers must respond to consumer requests within 45 days and conduct data protection assessments for processing activities presenting a heightened risk of harm.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

Kottmann also reportedly even posted some of the videos on Twitter, which later deleted the hacker’s account and their offending tweets. That type of information can be extremely valuable for things like identity theft.”. Thought leaders advise reducing or eliminating the use of these skeleton key-like accounts.