The Federal Trade Commission (FTC) issued a press release on March 15, 2022, stating that it was taking action against CafePress “over allegations that it failed to secure consumers’ sensitive personal data and covered up a major breach” by filing a complaint against Residual Pumpkin Entity, LLC formerly d/b/a/ CafePress and PlanetArt, LLC d/b/a CafePress.
March 2022
Final BVLOS ARC Report Issued with over 70 Recommendations for the FAA
Last week, the Unmanned Aircraft Systems (UAS) Beyond Visual Line of Sight (BVLOS) Aviation Rulemaking Committee’s (ARC) Final Report was released. The report has been much anticipated by the drone industry and its stakeholders. The report recommends a complete overhaul of existing Federal Aviation Administration (FAA) regulations with entirely new regulations. The goal of that…
Privacy Tip #323 – FTC Warns Consumers of FTC Imposters
It’s an old trick, but it works, so alerting our readers is worth repeating. The Federal Trade Commission (FTC) issued a Scam Alert this week warning consumers that fraudsters are impersonating FTC officials.
According to the Alert, scammers are “pretending to be FTC Commissioner Rebecca Kelly Slaughter and staff at the FTC. They’re emailing, saying…
Chinese APT41 Attacking State Networks
Although we are receiving frequent alerts from CISA and the FBI about the potential for increased cyber threats coming out of Russia, China continues its cyber threat activity through APT41, which has been linked to China’s Ministry of State Security. According to Mandiant, APT41 has launched a “deliberate campaign targeting U.S. state governments” and…
New York Law Incorporates Identity Theft into the Definition of Elder Abuse
New York recently passed legislation to amend the definition of elder abuse to include identity theft. This is important as an acknowledgement of the seriousness of the problem of identity theft involving the elderly, and the legislation will also allow victims of identity theft to be eligible for resources that provide support services and programs…
Wyoming Enacts Genetic Data Privacy Act
Governor Mark Gordon signed the Wyoming Genetic Data Privacy Act into law on March 8, 2022. The law goes into effect on July 1, 2022.
The Genetic Data Privacy Act requires any business that collects genetic data from individuals to: (1) provide transparent information to consumers about the collection, use, and disclosure of genetic data…
Police Use Drones and Other Innovative Technology for Public Safety Efforts
Police across the United States are increasingly relying on emerging technologies to make their jobs more efficient and to increase public safety. Police are using drones, license plate readers, gunshot detection systems and even robots to reduce injury and harm. To no one’s surprise, law enforcement agencies have struggled with retention and hiring during the…
Privacy Tip #322 – Monitor Apps Collecting Kids’ Data
There is a federal law, the Children’s Online Privacy Protection Act (COPPA), that requires app developers to obtain parental consent before collecting information from children under the age of 13. The law has been on the books for a long time, yet companies are not always in compliance with it.
The Federal Trade Commission (FTC)…
Hackers Target Russia in Support Of Ukraine
The world has rallied around Ukraine since Russian forces invaded this past week, including, it seems, hackers. The hacktivist collective Anonymous, which gained prominence between 2008 and 2014 with a series of high-profile politically motivated cyber-attacks against such disparate groups as the Church of Scientology and PayPal, has come out of the woodwork once again…
CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine
The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of destructive malware that is being used to target organizations in Ukraine, with the ongoing warnings of increased cyber-attacks against U.S. organizations.
The malware, WhisperGate and HermeticWiper, is used to “destroy computer systems and render them inoperable.”…