article thumbnail

Government Shutdown Leaves Americans More Vulnerable to Identity Theft, Scams

Adam Levin

citizens are more vulnerable to the effects of identity theft and scams as a result of the ongoing government shutdown. The two primary websites created by the government as resources for victims of identity theft, IdentityTheft.gov and FTC.gov/complaint , are currently offline as part of the partial shutdown of the Federal Trade Commission.

article thumbnail

Consumer Watchdog Sues Zoom Over Encryption Statements

SecureWorld News

The non-profit consumer advocacy group just announced that it is suing Zoom Video Communications, Inc for violating the District of Columbia Consumer Protection Procedures Act (DCCPPA), which prohibits unlawful trade practices and false advertising. End-to-end encryption. What did Zoom allegedly lie about?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

As a result, these enormous IT infrastructures are extremely challenging to govern and secure. Additionally, in some geographies Telecoms are tightly coupled with critical government infrastructure operations. Together, both Thales and Red Hat offer solutions to overcome some of these data protection and management challenges.

article thumbnail

Zoom Faces More Legal Challenges Over End-to-End Encryption

Threatpost

The video-conferencing specialist has yet to roll out full encryption, but it says it's working on it.

article thumbnail

DOJ Lawsuit Targets Apple's Privacy 'Shield' in Antitrust Fight

SecureWorld News

Central to the government's case is the claim that Apple has selectively compromised on privacy and security to boost its financial interests and lock out competition. Apple wraps itself in a cloak of privacy, security, and consumer preferences to justify its anticompetitive conduct," the lawsuit states.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

As a result, these enormous IT infrastructures are extremely challenging to govern and secure. Additionally, in some geographies Telecoms are tightly coupled with critical government infrastructure operations. Together, both Thales and Red Hat offer solutions to overcome some of these data protection and management challenges.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

See the Top Governance, Risk and Compliance (GRC) Tools. Financial Data Protection Laws. financial data must comply with consumer-protection laws such as the Electronics Fund Transfer Act (EFTA) and a litany of regulations enforced by the SEC (such as Sarbanes-Oxley), CFTC, FISMA, and other financial regulatory bodies.