article thumbnail

IdentityIQ Releases Report on Newest Scams to Target Your Identity

Identity IQ

This report explores key findings based on IdentityIQ member-reported data and found significant jumps in two major types of scams: peer-to-peer payment apps utilizing platforms such as Cash App, Zelle and Venmo, surging more than 58%, and scams stemming from the theft of personal documents, increasing by 44%.

Scams 86
article thumbnail

Indiana sues TikTok, describes it as "Chinese Trojan Horse"

Malwarebytes

The second suit claims that TikTok violated consumer protection laws by not disclosing that China has access to sensitive user data. TikTok is a wolf in sheep's clothing," court documents read, echoing what Federal Communications Commission (FCC) Chairman Brendan Carr said about TikTok back in July.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

Maryland Personal Information Protection Act – Security Breach Notification Requirements – Modifications (House Bill 1154). Massachusetts 201 CMR 17 (aka Mass Data Protection Law). 4806 — An Act relative to consumer protection from security breaches. Law on the Protection of Personal Data Held by Private Parties — Mexico.

CSO 128
article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

To prove ownership over the hijacked firms, they hire low-wage image editors online to help fabricate and/or modify a number of official documents tied to the business — including tax records and utility bills. Another team member works on revising the business documents and registering them on various sites.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Together, both Thales and Red Hat offer solutions to overcome some of these data protection and management challenges. Encrypting this data with Thales CipherTrust Transparent Encryption (CTE) secures files and documents, ensuring that only those with authorized encryption keys can access them.

article thumbnail

Government Shutdown Leaves Americans More Vulnerable to Identity Theft, Scams

Adam Levin

This effectively leaves victims unable to file reports or get documentation of their stolen identities, which is typically a first step for mitigating damage to credit and financial accounts. . Also affected by the shutdown is the Internal Revenue Service , which sees identity theft-related tax fraud peak from January to April.

article thumbnail

Scary Fraud Ensues When ID Theft & Usury Collide

Krebs on Security

The reader who shared this story (and copious documentation to go with it) asked to have his real name omitted to avoid encouraging further attacks against his identity. One reader’s nightmare experience spotlights what can happen when ID thieves and hackers start targeting online payday lenders. So we’ll just call him “Jim.”