article thumbnail

IDIQ Names Veteran Michael Scheumack Chief Marketing Officer

Identity IQ

IDIQ Names Veteran Michael Scheumack Chief Marketing Officer. Temecula, California, October 11, 2022 – IDIQ , an industry leader in identity theft protection and credit report monitoring, has named Michael Scheumack to the role of chief marketing officer. IdentityIQ. Scheumack began his career serving in the U.S.

article thumbnail

DOJ Lawsuit Targets Apple's Privacy 'Shield' in Antitrust Fight

SecureWorld News

Department of Justice has leveled a major antitrust case against Apple, accusing the iPhone maker of wielding consumer privacy and security as an "elastic shield" to justify anticompetitive business practices. Consumers should not have to pay higher prices because companies violate the antitrust laws," said U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI-generated voices in robocalls are illegal, rules FCC

Malwarebytes

The Federal Communications Commission (FCC) has announced that calls made with voices generated with the help of Artificial Intelligence (AI) will be considered “artificial” under the Telephone Consumer Protection Act (TCPA). Violations of the TCPA are subject to stiff civil penalties.

Scams 139
article thumbnail

EU Parliament adopts Digital Services Act, but concerns persist

Bleeping Computer

The European Parliament's Internal Market and Consumer Protection Committee has adopted the Digital Services Act (DSA) proposal by 36 votes to 7 and 2 abstentions. [.].

article thumbnail

Explained: Privacy washing

Malwarebytes

Data are the most coveted currency of our era, and technology giants like Facebook, Google, and Amazon are considered the behemoths of the data gathering industry. And to achieve that goal it needs to gather as much information as possible about us. Maybe not specifically about us as a person, but at least about us as a group.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Legacy Technology Clashes : Most Telcos have very large legacy IT footprints. This unfortunately does not always integrate well with more modern technologies such as containerized or Kubernetes-based cloud-native applications. Encryption Melody Wood | Partner Solutions Marketing Manager, Thales More About This Author > Schema

article thumbnail

GUEST ESSAY: A primer on the degrees of privacy tech companies assign to your digital footprints

The Last Watchdog

Marketers frequently purchase or share first-party data from another partner organization. Regulations such as the California Consumer Protection Act (CCPA) in the US and General Data Protection Regulation (GDPR) in the EU address this, particularly when personally identified information ( PII ) is involved.

eCommerce 113