DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

C’mon, FTC, when will you do something? (update 2)

Posted on February 18, 2014 by Dissent

It has now been about two years since I filed a complaint with the FTC to alert them to all the data security breaches involving Experian’s credit report database.

And while I continue to   wait to see the FTC take action against Experian over their numerous breaches involving misuse of clients’ login credentials, Experian has reported yet another breach of the same type, it seems.

This time it’s reportedly the Colorado Bureau of Investigation whose login credentials were compromised. The fact that the CBI had their login credentials compromised does not inspire confidence in them, but the fact of the matter is that it doesn’t seem to matter what clients have their login credentials compromised. Login credentials of a client seem to be the keys to the kingdom of Experian’s vast credit report database.

The letter to those affected, dated February 14, indicates that the unauthorized access to the consumers’ credit report(s) in Experian’s database occurred between January 30 and January 31, and would have involved name and address as well as one or more of  date of birth, Social Security numbers, account information, and whatever information you’d find in a credit report.

As it has done in the past, Experian offers the affected consumer(s) two years of free credit monitoring services using Experian’s own service – which only provides daily checks of Experian’s own database of credit reports and does not also check Equifax and TransUnion for signs of suspicious activity.

So after failing to adequately protect its database from those who access or phish their clients’ login credentials, Experian offers consumers who are powerless to prevent the breach Experian’s  own product for free and tries to up-sell it at the end of the complimentary service period?

C’mon, FTC, if you’re serious about protecting consumers from harm, then do something about Experian’s inadequate data security. About 100 breaches already that we know about – and how many more that we don’t know about because most states do not have a central repository of breach reports?

Do something already. Seriously.

Update: In addition to the notification to Vermont residents cited above, this brach was also reported to the New Hampshire Attorney General’s office and two NH residents.

Update 2: It was also reported to five Maryland residents.

 

 


Related:

  • Cyberattacks Paralyze Major Russian Restaurant Chains
  • Legal Silence and Chilling Effects: Injunctions Against the Press in Cybersecurity
  • Suspected XSS Forum Admin Arrested in Ukraine
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
Category: Breach IncidentsBusiness SectorCommentaries and AnalysesOf NoteU.S.Unauthorized Access

Post navigation

← AU: Asylum seekers’ identities revealed in Immigration Department data lapse
Blue Shield of California notifies agents that their SSN was exposed →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.