article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

The Blacklist Alliance provides technologies and services to marketing firms concerned about lawsuits under the Telephone Consumer Protection Act (TCPA), a 1991 law that restricts the making of telemarketing calls through the use of automatic telephone dialing systems and artificial or prerecorded voice messages.

Mobile 329
article thumbnail

The CPRA: What You Should Know as an InfoSec Professional

SecureWorld News

Spirion, leads the discussion, which includes: A comparison of the CCPA and CPRA with other state privacy protection regulations, including the Virginia Consumer Data Protection Act, Colorado Privacy Act, Connecticut Data Protection Act, and Utah Consumer Privacy Act. Cyber insurance (critical).

InfoSec 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

are subject to laws such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (the HITECH Act), as well as regulations such as the Clinical Laboratory Improvements Amendments (CLIA). Financial Data Protection Laws.

article thumbnail

FCC comes down hard on robocallers with record $300m fine

Malwarebytes

A robocall network makes use of automated software diallers to spam out large numbers of cold calls to unsuspecting recipients. The calls also violated spoofing laws by using misleading caller ID to disguise the enterprise’s role and prompt consumers to answer. These calls promise much but give very little.

Scams 78
article thumbnail

CNA legal filings lift the curtain on a Phoenix CryptoLocker ransomware attack

Malwarebytes

Two months after fully restoring its systems, CNA Financial, the leading US insurance company that was attacked by a group using Phoenix CryptoLocker ransomware, issued a legal notice of an information security incident to the Consumer Protection Bureau in New Hampshire. Data stolen but untouched.

article thumbnail

Common Holiday Scams and How to Avoid Them

Identity IQ

IdentityIQ members reap the benefits of credit monitoring with real-time alerts, dark web and internet monitoring , VPN and antivirus software , identity theft insurance of up to $1 million underwritten by AIG, stolen identity restoration support, and more. Familiarize yourself with common red flags to recognize potential scams.

Scams 52
article thumbnail

Me on the Equifax Breach

Schneier on Security

Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". Subcommittee on Digital Commerce and Consumer Protection. The security breach was a result of a vulnerability in the software for their websites: a program called Apache Struts. Data brokers will still collect data about consumers who opt out.