article thumbnail

Consumer Watchdog Sues Zoom Over Encryption Statements

SecureWorld News

The non-profit consumer advocacy group just announced that it is suing Zoom Video Communications, Inc for violating the District of Columbia Consumer Protection Procedures Act (DCCPPA), which prohibits unlawful trade practices and false advertising. End-to-end encryption. What did Zoom allegedly lie about?

article thumbnail

Zoom Faces More Legal Challenges Over End-to-End Encryption

Threatpost

The video-conferencing specialist has yet to roll out full encryption, but it says it's working on it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Together, both Thales and Red Hat offer solutions to overcome some of these data protection and management challenges. 1 – Encrypt Data at Rest To prevent data leakage, unauthorized access, and physical theft organizations are increasingly looking to secure data at rest.

article thumbnail

Student Sues Whiteworth University for Ransomware Attack

CyberSecurity Insiders

Patrick Loyola is the student who filed the suit as the University failed to protect the data storage servers that stored highly sensitive information about former and present students. The post Student Sues Whiteworth University for Ransomware Attack appeared first on Cybersecurity Insiders.

article thumbnail

DOJ Lawsuit Targets Apple's Privacy 'Shield' in Antitrust Fight

SecureWorld News

Antitrust experts say the lawsuit's focus on Apple's privacy practices is a novel legal strategy that could remake the landscape for technology competition and consumer protection. RELATED: Apple Strengthens iMessage Security with Post-Quantum Encryption ] Follow SecureWorld News for more stories related to cybersecurity.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

Together, both Thales and Red Hat offer solutions to overcome some of these data protection and management challenges. 1 – Encrypt Data at Rest To prevent data leakage, unauthorized access, and physical theft organizations are increasingly looking to secure data at rest.

article thumbnail

8 Ways to Protect Yourself against Scams on Black Friday and Cyber Monday

Adam Levin

Credit cards come with consumer protections that limit your liability if your card information is stolen. It’s best to do your banking and shopping at home, but if you have to use public Wi-Fi, consider using a VPN (virtual private network) that encrypts your activity. You are using a credit card, yes? Change your passwords.

Scams 239