Remove Consumer Protection Remove Data breaches Remove Software
article thumbnail

National Consumer Protection Week: Keeping your personal data safe in a digitally connected world

Webroot

March is a time for leprechauns and four-leaf clovers, and as luck would have it, its also a time to learn how to protect your private data from cybercrime. Each year, the first week of March (March 2-8) is recognized as National Consumer Protection Week (NCPW).

article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers.

Mobile 361
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

The Last Watchdog

They point out how supply chains rely on software yet lack the security tools to protect them. Data breaches exposed over 37 billion records in 2020 alone — a 141% jump from 2019. Businesses must automatically secure their supply chains to protect themselves and comply with consumer-protection laws.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

GDPR, the EU’s flagship data privacy and “right to be forgotten” regulation, has made the stakes of a data breach higher than ever. Health data and patient data in the U.S. Financial Data Protection Laws. In the U.S., Automating IT Compliance with Security Compliance Tools.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. APIs are software intermediaries that enable two software components to communicate with each other. What are APIs?

article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

Notable State Cybersecurity Laws to Know Cybersecurity Regulations by Industry Cybersecurity Regulations Strategies for Compliance and Risk Management Bottom Line: Navigating the Complexities of Cybersecurity Regulations Featured Partners: Cybersecurity Software Learn More Learn More Learn More What are Cybersecurity Laws & Regulations?

article thumbnail

CNA legal filings lift the curtain on a Phoenix CryptoLocker ransomware attack

Malwarebytes

Two months after fully restoring its systems, CNA Financial, the leading US insurance company that was attacked by a group using Phoenix CryptoLocker ransomware, issued a legal notice of an information security incident to the Consumer Protection Bureau in New Hampshire. Data stolen but untouched.