'Is that even legal?': Companies may be sharing new credit or debit card information without you knowing

'Is that even legal?': Companies may be sharing new credit or debit card information without you knowing

Vanessa Acuña blames an "updating service" that some credit and debit card companies have that allows new account numbers and expiry dates to be shared with merchants customers have dealt with in the past.

SecurityWatch: Make Corporations, Not Customers, Suffer for Data Breaches

SecurityWatch: Make Corporations, Not Customers, Suffer for Data Breaches

On March 29, Earl Enterprises announced that visitors to its chain restaurants may have had their credit card information stolen. If you ate out at specific Buca di Beppo, Chicken Guy!, Earl of Sandwich, Mixology, Planet Hollywood, or Tequila Taqueria, you may have had your credit or debit card information stolen.

Wirecutter Weekly: How safe is your privacy in a smart home?

Wirecutter Weekly: How safe is your privacy in a smart home?

This great CNET piece reports that facial recognition in devices like the Nest Cam IQ, Honeywell Smart Home Security, and even the Sony Aibo robot dog don’t comply with Illinois’s Biometric Information Privacy Act, which “defines ‘biometric identifiers’ as retina scans, iris scans, fingerprints, hand scans, face scans and voiceprints.” As reported in the New York Times, cameras have been installed (but not yet activated, so they say) on planes.

As cashless stores grow, so does the backlash

As cashless stores grow, so does the backlash

Before this year there was only one jurisdiction that required businesses to accept cash: Massachusetts, which passed a law nearly 40 years ago.“The potential societal cost of a cashless economy I think outweighs the potential benefits for businesses,” said Ritchie Torres, a New York City councilman for the South Bronx who introduced the bill.

Malware and Firmware Trojans

Malware and Firmware Trojans

1 Malware 1.1 The Importance of a Malware Free System 1.2 The Utility of Antivirus Tools 1.3 Preventing Malware Infections 1.4 Detecting Malware Infections 1.5 Watering Hole Attacks 2 Firmware Trojans 2.1 Virtualizers and Hardware Compromise 2.2 The Promise of Libre Firmware 3 References Malware[edit ].

“5 Surprisingly Easy Ways We Let People Steal Our Identity.” (From our Forums.)

“5 Surprisingly Easy Ways We Let People Steal Our Identity.” (From our Forums.)

When personal information is fraudulently used to open new accounts, BJS says, people affected experience a lot financial problems in the future. Someone calls you claiming to be from your bank and asks for sensitive personally identifiable information like your social security number.

Universal Loss of Privacy & the Bullish Case for Bitcoin Adoption

Universal Loss of Privacy & the Bullish Case for Bitcoin Adoption

Then, with the leak of the Panama Papers and the Paradise Papers, significant more and more global scrutiny has been placed on offshore entities and asset protection — tools frequently used by wealthy businessmen and politicians.

New Jersey becomes second state to ban cashless shops and restaurants

New Jersey becomes second state to ban cashless shops and restaurants

Murphy's signature makes New Jersey the second state in the US to ban cashless stores, after Massachusetts banned them in 1978. Much like Philadelphia's new law, New Jersey's law makes an exception for parking garages and car rental companies, where a credit card is required upfront for incidentals.

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

Use credit instead of debit – When running a transaction as debit and entering your PIN, you are foregoing many of the protection features of the card per your user agreement.

AMA : technology

AMA : technology

PI challenges overreaching state and corporate surveillance, so that people everywhere can have greater security and freedom through greater personal privacy. Frederike Kaltheuner , PI's Lead on Corporate Exploitation and Christopher Weatherhead , Technology Officer will be here to discuss our research, findings and our environment!

Sorry Amazon: Philadelphia bans cashless stores

Sorry Amazon: Philadelphia bans cashless stores

with 144 posters participating Share this story This week, Philadelphia's mayor signed a bill that would ban cashless retail stores, according to The Morning Call . The move makes Philadelphia the first major city to require that brick-and-mortar retail stores accept cash.

Monetary Institutionalism Against the State

Monetary Institutionalism Against the State

Social relations were a significant element of these monetary systems, making institutional characteristics the lynchpin of credit and money. The institutional approach allows us to understand these systems as fluid reactions against financialisation and commodification and in favour of restoring the social relations of credit and money.

Commentary: Actually, China’s social credit system isn’t the first

Commentary: Actually, China’s social credit system isn’t the first

BEIJING: Western media reports have swirled about China’s social credit system, which is intended to nudge Chinese citizens to adopt good behaviour, including motivating them to pay outstanding debts and fines, as well as encouraging them to obey the country’s laws and regulations.

Here are the data brokers quietly buying and selling your personal information

Here are the data brokers quietly buying and selling your personal information

Edvisors Network Inc. Edvisors “provides independent advertising-supported platforms for consumers to search compare and apply for private student loans.” Enformion Enformion “aggregates billions of United States public records into one of the largest online people databases.” Epsilon Data Management LLC Epsilon is one of the largest data management companies in the world, and provides direct marketing and customer relationship management services, sending more than 40 billion e-mails each year.

China bans 23m from buying travel tickets as part of 'social credit' system

China bans 23m from buying travel tickets as part of 'social credit' system

According to the National Public Credit Information Centre’s 2018 report, 17.5 million people were banned from buying flights and 5.5 million barred from purchasing high-speed train tickets because of social credit offences.

Kris Constable's digital log

Kris Constable's digital log

This means there will be a new wave in short order of FinTech apps that are offering you services to make your financial life easier — and the question will be the same as your web surfing and free email service choices — will you accept the convenience of what they offer, in exchange for your privacy?

Browser extensions could be spying on you, and that is not their fault

Browser extensions could be spying on you, and that is not their fault

Since most of the extensions were installed without carefully looking into requested permissions, there is a good chance that you don’t remember what exactly some of your extensions doing. You can install it by following the link: Augeas: Clean browser from spying extensions - Chrome Web Store Why another extension?

Verifying Software Signatures

Verifying Software Signatures

[3] In this instance, "other authentication systems" refers to: [4] Checking Digital Fingerprints of Signed Software [ edit ] Once a user has carefully: Then the file(s) signatures must be verified against the signing key.

How criminals are using the low-interest credit card scam to steal your identity

How criminals are using the low-interest credit card scam to steal your identity

With Johnston's permission, Marketplace provided her information to Terbium Labs, a Baltimore-based cybersecurity company that specializes in monitoring online platforms for stolen data, including the dark web.

How State and Federal Governments Are Responding to Concerns about Data Privacy

How State and Federal Governments Are Responding to Concerns about Data Privacy

As any lawyer will tell you, privacy has always been a tricky issue to pin down, and the digital age has made that even more obvious, as consumers seem both more willing than ever to share private information about themselves freely online and simultaneously more concerned that such information might be used improperly.

We Need to Fix the ‘Data Wild West’

We Need to Fix the ‘Data Wild West’

Ignite is marketed as a “revolutionary portfolio of premier data and advanced analytics solutions.” Equifax claims that the product aims to offer companies specialised data, so they can “pinpoint specific risk groups, target audiences and more.” Under all of this lingo lies a striking reality: the personal data of millions of people outside of the European Union might be on the databases Equifax is selling to its customers, many of them without any legal safeguards in regard to its use.

Syncthing

Syncthing

Donate Developing Syncthing costs money. Your donations help fund these costs. Donate securely using any major credit or debit card, processed by Stripe . Your card was not charged. Thank you! We will survive a little longer thanks to you!

And it's go, go, go for class-action lawsuits against Equifax after 148m personal records spilled in that mega-hack

And it's go, go, go for class-action lawsuits against Equifax after 148m personal records spilled in that mega-hack

They argued they have spent extra time and money in the aftermath of the hack: responding to the compromise of the credit reporting system, and the leak of personal information they rely on for their business; on assessing the impact of the breach; and on mitigating what they say is a substantial risk of future fraudulent activity.

The internet of human things: Implants for everybody and how we get there

The internet of human things: Implants for everybody and how we get there

Also: How smart contact lenses will help keep an eye on your health Occasionally, I get a so-called compatible terminal that doesn't actually work, so then I try it with my iPhone, which also has similar NFC technology installed on it to work with Apple Pay. And, if that doesn't work, I pull out my credit card as a last resort.

Your digital identity has three layers, and you can only protect one of them

Your digital identity has three layers, and you can only protect one of them

It is shaped by technology companies and advertisers who make key decisions based on their interpretation of seemingly benign data points: what movies you choose to watch, the time of day you tweet, or how long you take to click on a cat video.

Facebook knowingly duped game-playing kids and their parents out of money

Facebook knowingly duped game-playing kids and their parents out of money

A couple of months earlier, she had launched a project to help Facebook reduce chargebacks from the credit card companies, who were forcing the social media giant to return money spent by children on games after hearing from outraged parents who said they were duped.

Poor practices expose 24 million financial records

Poor practices expose 24 million financial records

“Numerous suppliers and partners may urgently need their data for various legitimate business purposes, but fail to maintain appropriate internal security controls.” Read more about data protection Third-party risk management is not a silver bullet either, said Kolochenko.

China Starts "Debt Shaming": New App Warns Users If They Are Walking Near Someone In Debt

China Starts "Debt Shaming": New App Warns Users If They Are Walking Near Someone In Debt

The "map of deadbeat debtors" is yet the latest in China's push towards a shame-based "social credit score" system which has already been deployed in several parts of the country.

Amazon and Chase Will Not Give Me a Straight Answer About What They Do With My Credit Card Data

Amazon and Chase Will Not Give Me a Straight Answer About What They Do With My Credit Card Data

Advertisement It was a very unsatisfying hunt for an answer, but there’s a clear takeaway: If you have the Amazon Prime Chase card and you’re worried about Amazon getting more data about you, only use it to buy things from Amazon and Whole Foods.

Afterpay accessing electoral roll data under laws designed to target terrorism, money laundering

Afterpay accessing electoral roll data under laws designed to target terrorism, money laundering

The Australian Electoral Commission would not comment on whether the use of the data by the companies was appropriate as the anti-terrorism and money-laundering legislation was administered by the Attorney-General's Department.

More