Remove Consumer Protection Remove Risk Remove Surveillance
article thumbnail

Your location or browsing habits could lead to price increases when buying online

Malwarebytes

The name for this method is surveillance pricing, and the FTC has just released initial findings of a report looking into that practice. In July 2024, the FTC requested information from eight companies offering surveillance pricing products and services that incorporate data about consumers characteristics and behavior.

article thumbnail

Legal Zero-Days: How Old Laws Became a Novel Loss Generator

SecureWorld News

[RELATED: The Pixel Lawsuits Aren't About Pixels ] Plaintiffs are bringing claims under wiretap laws passed in the 1960s, privacy statutes from the early days of home video, and consumer protection provisions that predate modern web architecture. There's nothing futuristic about this version of privacy risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape. Critical infrastructure face heightened risk from targeted disruptions, as do small businesses who are the backbone of the economy.

article thumbnail

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Zero Day

Close Home Tech Security 16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself Wondering if your information is posted online from a data breach? Here's how to check if your accounts are at risk and what to do next. What happens when an attacker is inside a network?

article thumbnail

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Zero Day

Here are the facts and how to protect yourself Wondering if your information is posted online from a data breach? Here's how to check if your accounts are at risk and what to do next. Whether or not financial information is involved, if enough personal data is available online, ID theft and fraud are still risks

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

New IoT Security Regulations

Schneier on Security

But like nearly all innovation, there are risks involved. And for products borne out of the Internet of Things, this means the risk of having personal information stolen or devices being overtaken and controlled remotely. It falls upon lawmakers to create laws that protect consumers.

IoT