article thumbnail

Your location or browsing habits could lead to price increases when buying online

Malwarebytes

The name for this method is surveillance pricing, and the FTC has just released initial findings of a report looking into that practice. In July 2024, the FTC requested information from eight companies offering surveillance pricing products and services that incorporate data about consumers characteristics and behavior.

article thumbnail

Legal Zero-Days: How Old Laws Became a Novel Loss Generator

SecureWorld News

[RELATED: The Pixel Lawsuits Aren't About Pixels ] Plaintiffs are bringing claims under wiretap laws passed in the 1960s, privacy statutes from the early days of home video, and consumer protection provisions that predate modern web architecture. There's nothing futuristic about this version of privacy risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

These challenges include bias and discrimination embedded in algorithms, privacy violations due to enhanced surveillance capabilities, and the difficulty of assigning accountability for decisions made by AI systems. Ethics The ethical challenges posed by advancing AI technologies will demand urgent attention in 2025.

article thumbnail

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Zero Day

Unfortunately, many organizations will still prioritize secrecy over consumer protection in a bid to hush up incidents and protect their reputations. The attacker may conduct surveillance first, mapping a network to find the most valuable resources or to discover potential pathways to jump into other systems.

article thumbnail

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Zero Day

Unfortunately, many organizations will still prioritize secrecy over consumer protection in a bid to hush up incidents and protect their reputations. The attacker may conduct surveillance first, mapping a network to find the most valuable resources or to discover potential pathways to jump into other systems.

article thumbnail

Security Affairs newsletter Round 513 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Spreads via Impersonation of Official Email to Target Users in Taiwan Belgian prosecutor probes alleged Chinese hacking of intelligence service Exclusive: Hegseth orders Cyber Command to stand down on Russia planning Cybersecurity Trump 2.0

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.