Remove Consumer Protection Remove Media Remove Surveillance
article thumbnail

Your location or browsing habits could lead to price increases when buying online

Malwarebytes

The name for this method is surveillance pricing, and the FTC has just released initial findings of a report looking into that practice. In July 2024, the FTC requested information from eight companies offering surveillance pricing products and services that incorporate data about consumers characteristics and behavior.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

This week civil liberties groups in Europe won the right to challenge the UK’s bulk surveillance activities in the The Grand Chamber of the European Court of Human Rights. Related: Snowden on unrestrained surveillance. Ubiquitous surveillance. It’s a healthy thing that a captain of industry can see this. Advanced use cases.

article thumbnail

Cybersecurity Report: June 29, 2015

SiteLock

These files were said to derive from directly targeted NSA surveillance of the communications of multiple French leaders. The OTA evaluated these websites based on criteria in mainly three categories: consumer protection, privacy and security. Follow the SiteLock blog for the latest cybersecurity news.

article thumbnail

Overcoming Compliance Challenges in Cryptocurrency Regulations

Responsible Cyber

Research shows that only 19 out of 60 countries have detailed regulations that cover taxation, AML/CFT, consumer protection, and licensing [1]. Current Global Regulatory Framework Cryptocurrency regulations around the world lack uniformity. Different countries follow different approaches.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Social engineering tactics such as phishing will not only remain prevalent but evolve as attackers leverage AI to craft highly personalised attacks (spear phishing and whaling) , mimicking a victim’s tone or referencing contextual details with alarming accuracy using data from social media, public records, and other sources.

article thumbnail

Security Affairs newsletter Round 513 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Soldier Charged in AT&T Hack Searched Can Hacking Be Treason Group-IB contributes to joint operation of Royal Thai Police and Singapore Police Force leading to arrest of cybercriminal behind more than 90 data leaks worldwide UAC-0173 against the Notary Office of Ukraine (CERT-UA#13738) North Korea Responsible for $1.5