Lawsuit Shines Spotlight on AI Meeting Assistant Legal Risks

A new lawsuit filed in Illinois federal court highlights the legal risks associated with AI-based meeting assistants that offer transcription and speaker identification services on platforms like Zoom and Microsoft Teams. The complaint, filed by Illinois resident Katelin Cruz, alleges that California technology company Fireflies.AI Corp. illegally collects and stores biometric voice data of individuals…

Read More

Crypto kidnapping: John Woeltz, “Crypto King of Kentucky”, accused of having tortured tourists; The 2nd suspect would have been rendered

The investigators found a saw, a chicken thread, a body armor, ammunition and photos of the alleged victim with a weapon pointed towards his head. New York – The New York Post Reports that a Swiss cryptocurrency millionaire sought to question in the alleged kidnapping and torture of an Italian tourist will go to the…

Read More

iOS 18.2 camera bug haunts iPhone users

iOS 18.2 has been available for a few weeks now. However, some iPhone users – myself included – have noticed a bug that prevents the camera from working since updating to this new version. A Reddit thread was posted two weeks agoand users are still complaining about the problem with no solution in sight. The…

Read More

Iran ord the Crypto exchange curfew

The central bank of Iran would have imposed strict hours of operation on its national cryptography scholarships following a feat of $ 100 million on Nobitex by a group of pro-Israeli pirates. In a blog article on Wednesday, Chainsysys quoted reports adage Exchanges of interior crypto in Iran are now limited to operating hours between…

Read More

Mandiant associates with the Android team to tackle the hidden malicious software

Mandiant and the Android Security and Privacy team have collaborated to develop improved tools capable of detecting Android malware hidden in native mobile applications. While mobile devices become central for daily activities such as banks and health care management, they are increasingly attracting malicious actors aimed at operating sensitive data. A lucrative method used by…

Read More