Nissan Canada suffers a data breach that may have exposed around 1.3 Million of sensitive customers records of Nissan Canada finance.
Nissan Finance Canada offering 12 months of credit monitoring services through TransUnion at no cost for their Canada based customers.
Nissan finds an suspicious activities occurred in their network and an “unauthorized persons” may have gained access to the personal information of some customers who financed their vehicles.
Nissan Canada Data Breach may have exposed sensitive data such as customer name, address, vehicle make and model, vehicle identification number (VIN), credit score, loan amount and monthly payment.
In this case, Anyone who bought a Nissan but didn’t use the company’s financing arm is not affected and this incident did not affect any their payment card systems.
NCF first became aware of this incident on December 11, 2017. all the affected customers will be informed through email and Nissan offered for all NCF customers will be eligible for 12 months of credit monitoring services through TransUnion at no cost.
According to Nissan statement, NCF has contacted Canadian privacy regulators, law enforcement, and leading data security experts and Nissan set up a call center to answer customers questions. they can contact them 1-877-224-4711.
Paypal Acquired firm TIO Networks Data Breach that Impacts 1.6 Million Customers
123 Million American Households Sensitive Data Leaked Online – A Massive Data Leak
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March 3,…
Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption…
Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in cyber…
In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices…
Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and…
Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell…