Mozilla adds paid-for data-deletion tier to Monitor service The Register

Mozilla on Tuesday expanded its free privacy-monitoring service with a paid-for tier called Mozilla Monitor Plus that will try to get data brokers to delete their copies of subscribers' personal information.
Mozilla introduced Monitor in 2018 as a way to make people aware when their personal info may have been stolen, leaked, and/or illicitly traded online.
Called Firefox Monitor at launch, and now Mozilla Monitor, it provides a service that's not just similar to the venerable HaveIBeenPwned.com - it uses the HIBP database as its source.
Necessarily alert to revenue diversification opportunities in light of its dependence on Google paying to be the default search service on its beleaguered Firefox browser, Mozilla has taken Monitor beyond HIBP alerts, added data removal, and branded that expanded service Monitor Plus with a subscription fee of $8.99 per month.
The idea being that, for paying users, Monitor will do what it can to scrub their personal info from recognized data brokers that buy and sell netizens' details and records with other businesses, such as those folks' locations and online habits.
While Monitor flags up criminal activity, Monitor Plus deals with removing info from ostensibly legit brokers; we can't imagine the org will have much success persuading underworld fraudsters to remove people's records.
Mozilla joins more than a dozen other companies offering similar data removal services targeting a varying number of vendors, such as Abine's DeleteMe, Optery, and Incogni, among others.
These businesses contact data brokers and ask them to remove personal information from their info stores on behalf of netizens, a time-consuming and onerous process if done manually.
That falls well short of the 549 data brokers currently registered in the State of California's Data Broker Registry, to say nothing of firms not doing business in the state or just operating illegally.
So Mozilla Monitor Plus is an incomplete, temporary fix - sites may reacquire customer data, necessitating follow-up removal requests - in a largely unregulated data broker business that has made few accommodations to demands for privacy.
A decade ago, in 2014, the FTC called on Congress to do something about the data broker industry.
Which saw Facebook's Cambridge Analytica scandal and the implementation of Europe's 2016 General Data Protection Regulation, demands for data privacy and protection began showing results.
A year later, with browser rivals starting to block third-party cookies by default, Google saw the writing on the wall and set about designing its Privacy Sandbox advertising tools for a world grown wary of third-party tracking and data gathering.
Lately, info brokers have received a lot of attention - not enough to merit an actual federal privacy law but more than usual for the intervention-averse US. The Federal Trade Commission recently banned X-Mode Social from sharing or selling location data.
US Senator Ron Wyden called for domestic intelligence agencies to stop buying location data.
The Biden Administration is reportedly working on an executive order limiting data brokers from sharing or selling data on Americans to foreign adversaries.
The most significant development in the US in terms of data brokers has been California's Delete Act, which follows on the heels of the California Consumer Privacy Act and the state's Privacy Rights Act.
Starting January 1, 2026, the California Privacy Protection Agency is supposed to deploy a one-stop data deletion mechanism to allow consumers to request that data brokers stop tracking them and delete their personal info.
By August 1 that year data brokers will be required to process people's deletion requests every 45 days.
So two years hence or thereabout, Monitor Plus and related services may not be necessary for those in California - they'll no longer need to pay to recover the privacy taken from them without consent, at least with regard to third-party brokers.


This Cyber News was published on go.theregister.com. Publication date: Tue, 06 Feb 2024 22:13:06 +0000


Cyber News related to Mozilla adds paid-for data-deletion tier to Monitor service The Register

Mozilla adds paid-for data-deletion tier to Monitor service The Register - Mozilla on Tuesday expanded its free privacy-monitoring service with a paid-for tier called Mozilla Monitor Plus that will try to get data brokers to delete their copies of subscribers' personal information. Mozilla introduced Monitor in 2018 as a ...
9 months ago Go.theregister.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 month ago Aws.amazon.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
CISA adds Check Point Quantum Security Gateways and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog - CISA adds Apache Flink flaw to its Known Exploited Vulnerabilities catalog. CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog. CISA adds Google Chrome zero-days to its Known Exploited Vulnerabilities catalog. CISA adds ...
5 months ago Securityaffairs.com
Protecting User Privacy by Removing Personal Data from Data Broker Sites - As part of its new subscription service model, Mozilla Firefox is offering its users the possibility of finding and removing their personal and sensitive information from data brokers across the internet. To eliminate their phone numbers, e-mail, ...
8 months ago Cysecurity.news
Cypher Queries in BloodHound Enterprise - Our first use case is identifying Domain Trusts that exist within an environment. Our specific query here, Map Domain Trusts can be selected which automatically populates the search window with the built-in query. Selecting Search will then return a ...
9 months ago Securityboulevard.com
CVE-2013-0135 - Multiple SQL injection vulnerabilities in PHP Address Book 8.2.5 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) addressbook/register/delete_user.php, (2) addressbook/register/edit_user.php, or (3) ...
7 years ago
CVE-2017-17713 - Trape before 2017-11-05 has SQL injection via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp ...
6 years ago
CVE-2017-17714 - Trape before 2017-11-05 has XSS via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp parameter, ...
6 years ago
Mozilla Firefox's Premium Dark Web Monitoring Solution - Mozilla, renowned for its commitment to an open and secure internet, has recently made a strategic foray into unexplored realms with the introduction of a subscription-based dark web monitoring service. This bold move signifies the organization's ...
8 months ago Cysecurity.news
US Federal Agencies Miss Deadline for Incident Response Requirements - Although US federal agencies have made progress in preparing for and responding to cyber threats, too many have failed to meet the deadline to implement incident response capabilities required by law, according to the US Government Accountability ...
11 months ago Infosecurity-magazine.com
Optimizing Data Lake Usage with Effective Object Management - Data lakes are a popular solution for data storage, and for good reason. Data lakes are flexible and cost effective, as they allow multiple query engines and many object formats without the need to manage resources like disks, CPUs, and memory. In a ...
9 months ago Imperva.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
7 months ago Venturebeat.com
CVE-2023-52780 - In the Linux kernel, the following vulnerability has been resolved: net: mvneta: fix calls to page_pool_get_stats Calling page_pool_get_stats in the mvneta driver without checks leads to kernel crashes. First the page pool is only available if the bm ...
5 months ago Tenable.com
CVE-2024-47716 - In the Linux kernel, the following vulnerability has been resolved: ARM: 9410/1: vfp: Use asm volatile in fmrx/fmxr macros Floating point instructions in userspace can crash some arm kernels built with clang/LLD 17.0.6: BUG: unsupported FP ...
2 weeks ago Tenable.com
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
9 months ago Securityzap.com
New Relic warns customers it's experienced a cyber incident The Register - Web tracking and analytics outfit New Relic has issued a scanty security advisory warning customers it has experienced a scary cyber something. "We value our New Relic community and want to make our customers aware of a recent cyber security incident ...
11 months ago Theregister.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
11 months ago Helpnetsecurity.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
7 months ago Feeds.dzone.com
Guardz Launches Cybersecurity-as-a-Service for Small Businesses - Guardz, a Tel Aviv-based startup, has announced a successful $10 million seed funding round and the launch of its cybersecurity-as-a-service offering for small and medium-size businesses. The product integrates tightly with Microsoft 365 and Google ...
1 year ago Csoonline.com
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
7 months ago Feeds.dzone.com
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
1 year ago Tripwire.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
10 months ago Securityboulevard.com
Medusa Ransomware Unleashes New Tactics: Data Sale, Time Extension, and AI Threats - In the ever-evolving landscape of cyber threats, Medusa Ransomware has taken a bold step by launching a dedicated blog to publish victim details, offering a chilling one-click data sale for $10,000. This notorious group, distinct from Medusa Locker ...
9 months ago Cybersecurity-insiders.com
What is the NIST Cybersecurity Framework? Definition from SearchSecurity - The NIST Cybersecurity Framework provides guidance on how to manage and reduce IT infrastructure security risk. NIST created the CSF to help private sector organizations in the United States develop a roadmap for critical infrastructure ...
9 months ago Techtarget.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)