Consumer Security

New personal identification and authentication technologies have the potential to transform the way entertainment services are delivered, accessed and experienced. These technologies offer a high level of security, often incorporating biometrics such as voice, fingerprint, iris or retinal features, ...

Amazon, Google and Apple have suspended contractor review of consumer recordings following disclosures that the devices are nearly always listening and have captured personal, business and other delicate human interactions. Consumers using smart speakers and digital assistant apps from Amazon and Go...

Capital One Financial Corporation has announced a data breach affecting some 100 million people in the United States and another 6 million in Canada. The FBI arrested the alleged perpetrator of the breach in Seattle. Capital One on July 19 discovered someone had accessed its data stored online and o...

The FTC announced that Equifax has agreed to pay a minimum of $575 million as part of a global settlement of claims against it arising from a 2017 data breach that affected 147 million Americans. The settlement with the FTC, the Consumer Financial Protection Bureau, and 50 states and territories pot...

TECHNOLOGY LAW CORNER

Isn’t It Time to Buy Cyber Insurance?

Every day we read stories about data breaches and cyberattacks on business and government websites, and the resulting the loss of personally identifiable information. Cybercrime is on the rise, and given the ever-evolving methods of attack, meaningful relief and reliable measures to fend off cybercr...

A security researcher has found a flaw in the popular video conferencing app Zoom that could be used to turn on the camera on a Macintosh computer without a user's permission. The vulnerability allows any website to forcibly join a user to a Zoom call, with their video camera activated, without a us...

OPINION

The Threat of a Deepfake Fiasco

An AI technology called "deepfake" may be the next big threat we face as a society. Consider a recent video clip of Facebook CEO Marc Zuckerberg saying some outlandish things. You might think it is real -- but it's a deepfake. It's his image, and it sure sounds like him, but he never actually made t...

Chinese hackers likely are behind a series of cyberattacks against telecommunications companies around the world, security researchers have reported. The campaign, dubbed "Operation Soft Cell," has been active since 2012, according to Cybereason. There is some evidence suggesting even earlier activi...

TECHNOLOGY LAW CORNER

Cybercriminals Score Billions in Cryptocurrency Thefts

Are any of us at all surprised to learn that in just the first quarter of 2019 more than $1.2 billion worth of cryptocurrency was stolen? Probably not. This story follows the old line from bank robber Willie Sutton who is credited with saying that he robbed banks "because that's where the money is."

Many users of Facebook's WhatsApp messaging software are scrambling to patch the program in response to news of a flaw that allowed spyware to be installed on mobile phones running Android and iOS. "This new type of attack is deeply worrying and shows how even the most trusted mobile apps and platfo...

EXPERT ADVICE

Spring Cleaning Your Network Security

Spring may be my favorite time of year. The snow is melting, the sun is shining, and the air smells just a little bit fresher. It's as though the world is setting an example for the rest of us, letting us know that it's time to start fresh. It's time for spring cleaning -- and in the security world,...

Long an obsession of science fiction writers, "artificial intelligence" in the modern era of fast-paced technological innovation is a term that is as ubiquitous as it is nebulous. For the payments technology industry, however, the term describes advanced analytical technology that has an outsized po...

Consumers are becoming increasingly concerned about the hacking of their devices and data as they hear about more data breaches and have their own experiences with issues such as ransomware, identity theft and botnet attacks. Concerns about data security also have been shown to increase with ownersh...

An advocacy organization formed by cybersecurity professionals has joined the fight for "right to repair" legislation, which would allow consumers and third parties to repair electronic equipment without voiding manufacturers' warranties. Legislators in about 20 states have been working on some form...

E-Commerce Times Channels