Remove Consumer Protection Remove Risk Remove Technology
article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

The Blacklist Alliance provides technologies and services to marketing firms concerned about lawsuits under the Telephone Consumer Protection Act (TCPA), a 1991 law that restricts the making of telemarketing calls through the use of automatic telephone dialing systems and artificial or prerecorded voice messages.

Mobile 337
article thumbnail

The Need for Trustworthy AI

Schneier on Security

It doesn’t take much extrapolation from today’s technologies to envision AIs that will plan trips for you, negotiate on your behalf or act as therapists and life coaches. We expect those will be largely cleaned up as the technology improves over the next few years. The AIs of the future should be trustworthy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New IoT Security Regulations

Schneier on Security

Due to ever-evolving technological advances, manufacturers are connecting consumer goods­ -- from toys to lightbulbs to major appliances­ -- to the internet at breakneck speeds. The Internet of Things fuses products with communications technology to make daily life more effortless.

IoT 231
article thumbnail

AI-generated voices in robocalls are illegal, rules FCC

Malwarebytes

The Federal Communications Commission (FCC) has announced that calls made with voices generated with the help of Artificial Intelligence (AI) will be considered “artificial” under the Telephone Consumer Protection Act (TCPA). It is important to not engage in any conversation or respond to any prompts to minimize the risk of fraud.

Scams 141
article thumbnail

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

The Last Watchdog

Businesses must automatically secure their supply chains to protect themselves and comply with consumer-protection laws. Supply chain professionals have to ensure their technology can scale to meet demand increases. Quality data : Data-driven automation technology is only as good as the information it collects.

article thumbnail

Me on the Equifax Breach

Schneier on Security

Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". Subcommittee on Digital Commerce and Consumer Protection. For over 30 years I have studied the technologies of security and privacy. I am also a special advisor to IBM Security and the Chief Technology Officer of IBM Resilient. Before the.

article thumbnail

Facebook sued for siphoning facial recognition data without consent

Malwarebytes

Facebook was able to collect such data via its face recognition technology. Facebook introduced face recognition technology in 2010 to make tagging friends and family on photos more manageable. Facebook introduced face recognition technology in 2010 to make tagging friends and family on photos more manageable.