#anti-counterfeiting

[ follow ]
#cryptocurrency
Cryptocurrency
fromSecurityWeek
9 hours ago

International Operation Targets Multimillion-Dollar Crypto Theft Schemes

Operation Atlantic targets multimillion-dollar cryptocurrency theft, freezing $12 million in stolen assets and identifying over $45 million in stolen funds.
Cryptocurrency
fromTheregister
4 days ago

US, UK, Canadian cops disrupt $45M global crypto scam

A global cryptocurrency scam was disrupted, recovering $12 million and identifying over 20,000 fraud-linked wallet addresses across 30 countries.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

South Korea Implements Unified Crypto Withdrawal Rules to Combat Phishing

South Korea's regulators implemented stricter cryptocurrency withdrawal standards to combat voice phishing, reducing exception eligibility by over 99%.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromSecurityWeek
9 hours ago

International Operation Targets Multimillion-Dollar Crypto Theft Schemes

Operation Atlantic targets multimillion-dollar cryptocurrency theft, freezing $12 million in stolen assets and identifying over $45 million in stolen funds.
Cryptocurrency
fromTheregister
4 days ago

US, UK, Canadian cops disrupt $45M global crypto scam

A global cryptocurrency scam was disrupted, recovering $12 million and identifying over 20,000 fraud-linked wallet addresses across 30 countries.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

South Korea Implements Unified Crypto Withdrawal Rules to Combat Phishing

South Korea's regulators implemented stricter cryptocurrency withdrawal standards to combat voice phishing, reducing exception eligibility by over 99%.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
#cybersecurity
Information security
fromNextgov.com
4 days ago

Treasury debuts effort to share cyber threat intel with crypto firms

The Treasury Department will share cyber threat intelligence with cryptocurrency firms to enhance their cybersecurity measures against increasing threats.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
Information security
fromNextgov.com
4 days ago

Treasury debuts effort to share cyber threat intel with crypto firms

The Treasury Department will share cyber threat intelligence with cryptocurrency firms to enhance their cybersecurity measures against increasing threats.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
fromPopular Science
2 days ago

How to stop your smart TV from tracking you

Smart TVs are capable of tracking user data, including viewing habits and app usage, which can lead to personalized advertising and content recommendations. Users may prefer to limit this tracking to protect their privacy.
Privacy technologies
Marketing tech
fromDigiday
3 days ago

Future of Marketing Briefing: The ad industry has an AI label problem

The ad industry struggles with AI transparency, balancing honesty against potential loss in ad effectiveness.
World news
fromWIRED
4 days ago

China Is Cracking Down on Scams. Just Not the Ones Hitting Americans

Governments struggle to combat industrial-scale scamming operations linked to organized crime, causing billions in losses, particularly affecting foreign victims.
#fcc
Privacy professionals
fromTechCrunch
2 weeks ago

FCC bans import of new consumer routers made overseas, citing security risks | TechCrunch

The FCC has banned the import of new foreign-made consumer routers due to cybersecurity risks to U.S. national security.
Privacy professionals
fromTechCrunch
2 weeks ago

FCC bans import of new consumer routers made overseas, citing security risks | TechCrunch

The FCC has banned the import of new foreign-made consumer routers due to cybersecurity risks to U.S. national security.
Social media marketing
fromFortune
5 days ago

China is going after fake expert influencers, and the FTC's new five-year plan seems to lay the same groundwork | Fortune

Regulatory agencies in China and the U.S. are cracking down on influencer misinformation in health, finance, and education.
#supermicro
European startups
fromTheregister
5 days ago

Supermicro investigating alleged China chip smuggling

Supermicro is investigating charges against employees for violating US export restrictions related to AI servers sent to China.
Intellectual property law
fromTechzine Global
5 days ago

Supermicro launches investigation following case over server exports

Supermicro is investigating potential employee involvement in circumventing export regulations for advanced technology following a criminal case against three individuals.
European startups
fromTheregister
5 days ago

Supermicro investigating alleged China chip smuggling

Supermicro is investigating charges against employees for violating US export restrictions related to AI servers sent to China.
Intellectual property law
fromTechzine Global
5 days ago

Supermicro launches investigation following case over server exports

Supermicro is investigating potential employee involvement in circumventing export regulations for advanced technology following a criminal case against three individuals.
#artificial-intelligence
fromwww.theguardian.com
1 week ago

Buying a collectible? Beware fakers out to persuade you it's the real deal

Scams involving antiques and collectibles are almost as old as some of the items. But internet sales now mean fraudsters have a much wider audience.
E-Commerce
Cryptocurrency
fromnews.bitcoin.com
3 days ago

CFTC Names Key Innovation Task Force Team Focusing on Crypto, AI and Prediction Markets

CFTC establishes an Innovation Task Force to enhance regulatory clarity for crypto, AI, and prediction markets.
fromSecurityWeek
3 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
Marketing tech
fromExchangewire
5 days ago

Teads Expands Commitment to Inventory Quality & Safety Through Partnership with NewsGuard

Teads expands partnership with NewsGuard to enhance inventory quality and brand safety in its advertising marketplace.
fromwww.housingwire.com
3 days ago

Rocktop Digital aims to cut inefficiencies in mortgage asset trading

The transition here is a little bit of a fork. Rocktop Technologies is focused on some of the generative AI applications and data and documents, as well as automating some of the processes attached to default servicing and some of the trade operational pieces and capital markets.
Cryptocurrency
#ai
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromForbes
1 week ago
E-Commerce

AI Shopping: Why The Universal Commerce Protocol Changes Everything

UCP enables AI agents to manage transactions directly with retailers, eliminating friction in the shopping journey.
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
E-Commerce
fromForbes
1 week ago

AI Shopping: Why The Universal Commerce Protocol Changes Everything

UCP enables AI agents to manage transactions directly with retailers, eliminating friction in the shopping journey.
#privacy
Privacy professionals
fromBanray
1 week ago

BanRay.eu - Your face is not inventory

Meta's camera-equipped glasses compromise privacy by recording individuals without consent, turning them into data for AI training.
fromSecuritymagazine
2 months ago
Information security

Strong Privacy Requires Strong Security - and GenAI Raises the Stakes

Privacy and security must be integrated, with technical, procedural, and cultural controls enforcing privacy commitments through strong security fundamentals.
Privacy professionals
fromBanray
1 week ago

BanRay.eu - Your face is not inventory

Meta's camera-equipped glasses compromise privacy by recording individuals without consent, turning them into data for AI training.
US news
fromTheregister
2 weeks ago

Three more charged with trying to smuggle GPUs to China

Three individuals were charged with attempting to smuggle Nvidia GPUs to China, violating export controls and smuggling laws.
Information security
fromThe Hacker News
6 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#supply-chain-security
Information security
fromSecuritymagazine
3 weeks ago

Threat Actors Target the Entire Retail Supply Chain

Threat actors exploit shared supply chain vulnerabilities between wholesalers and retailers, with over 70% of retailers and 60% of wholesalers having exposed credentials, enabling widespread initial access.
Information security
fromSecuritymagazine
3 weeks ago

Threat Actors Target the Entire Retail Supply Chain

Threat actors exploit shared supply chain vulnerabilities between wholesalers and retailers, with over 70% of retailers and 60% of wholesalers having exposed credentials, enabling widespread initial access.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Crypto ATM Giant Discloses $3.7 Million Bitcoin Theft Following Cyberattack

Bitcoin Depot lost over 50 bitcoins in a cyberattack, prompting a review of IT security and potential regulatory implications.
fromwww.bbc.com
4 weeks ago

Race on to establish globally recognised 'AI-free' logo

AI is creating significant disruption and competing definitions of what is 'human made' are confusing consumers. A universal definition is essential to build trust, clarification and confidence. Without standardization, consumers face confusion distinguishing between genuinely human-made products and those using AI, undermining the credibility of the entire certification movement.
Graphic design
Information security
fromnews.bitcoin.com
1 week ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Travel
fromTravel + Leisure
4 weeks ago

Thieves Always Check These Common Hotel Hiding Spots First-Here, 8 Clever Ways to Protect Your Valuables

Hotel thieves target predictable hiding spots like toiletry kits and dresser drawers, making affordable security lock boxes and disguised containers essential for protecting valuables while traveling.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitgo CEO Proposes Using a Public Blockchain as the Ultimate Solution for Government Fraud

Mike Belshe proposes using a public blockchain to combat state and federal fraud, potentially addressing losses of up to $521 billion annually.
Artificial intelligence
fromTheregister
3 weeks ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
fromMedium
1 month ago

Folding in Traceability

In enterprise commerce, totals don't drift because someone forgot algebra. They drift because reality changes: promos expire, eligibility changes when an address arrives, catalog data updates, substitutions happen, and returns unwind prior discounts. When someone asks "why did the total change?" you need more than narration. You need evidence - a trail of facts you can replay and a pure computation that deterministically produces the same result.
Scala
Privacy professionals
fromSecurityWeek
3 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Intellectual property law
fromEngadget
2 weeks ago

Court temporarily blocks US government from labeling Anthropic as a 'supply chain risk'

A judge granted Anthropic a preliminary injunction against the US government, preventing a ban on its products and labeling it as a supply chain risk.
Artificial intelligence
fromEntrepreneur
4 weeks ago

How to Govern AI Before It Damages Your Brand

AI interactions directly shape brand perception, and customers attribute AI errors to the company rather than the algorithm, making AI governance essential for maintaining trust.
Business intelligence
fromSecuritymagazine
1 month ago

AI Security and Forensic Accounting: Protecting Financial Systems in an Automated World

AI-enhanced forensic accounting is essential for detecting financial fraud and payment manipulation in automated financial systems vulnerable to sophisticated, AI-driven attacks.
Venture
fromComputerworld
1 month ago

China announces new plans to take US industry head on

China aims to increase digital economy share to 12.5% of GDP by 2030 and boost funding for start-ups in advanced technologies to compete with the US.
Privacy professionals
fromMedCity News
3 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Privacy technologies
fromTheregister
1 month ago

Meta, cops deploy AI and handcuffs in scam crackdown

Meta deployed anti-scam tools across WhatsApp, Facebook, and Messenger, including device-linking warnings and suspicious friend request alerts, while law enforcement disrupted scam networks and arrested 21 fraudsters.
Privacy professionals
fromTheregister
4 weeks ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Information security
fromThe Hacker News
4 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
Marketing tech
fromExchangewire
1 month ago

EXTE Joins Forces with HUMAN Security to Protect Ad Inventory Quality & Integrity

EXTE integrated HUMAN Security's MediaGuard fraud detection solution to validate ad inventory, reduce invalid traffic and bot activity, and ensure only quality placements reach buyers.
Intellectual property law
frompatentlyo.com
1 month ago

Guest Post: Protectionist PTO Memo is on a Collision Course with TRIPS

USPTO Director's new policy considers U.S. manufacturing status when deciding whether to institute IPR and PGR proceedings, potentially conflicting with WTO TRIPS obligations requiring nondiscriminatory patent treatment.
Food & drink
fromwww.bbc.com
2 months ago

Why food fraud persists, even with improving tech

Counterfeit honey is widespread, difficult to detect, economically damaging to beekeepers, and often indistinguishable from genuine honey using current testing methods.
Information security
fromSecuritymagazine
1 month ago

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

Object-specific protection is essential as a primary security layer to prevent art theft, as comprehensive facility-wide systems fail when adversaries physically interact with high-value objects without triggering alarms.
fromFortune
2 months ago

One way AI won't ruin the world: tools to crack down on the $23 billion animal trafficking trade | Fortune

Historically, enforcement has been largely reactive. There is so much global trade that fewer than 1 in 10 international cargo shipments of any kind are physically inspected. Traffickers also avoid detection by using false or generic names instead of proper species identification, employing coded language in online listings, rerouting shipments and shifting to different messaging platforms when enforcement pressure increases. Emerging digital tools are helping authorities link online monitoring, legal reference tools and on-the-ground investigations.
Environment
fromwww.bbc.com
2 months ago

'Thieves broke into my car - to take parcel shelf'

She said people "just couldn't believe" cars were being broken into just for the shelves. The Met Police opened an investigation following a number of parcel shelves being stolen from cars in Hampstead and Highgate, the force said. Sam Phipps Phipps told BBC Radio London her car was targeted despite only having her gym bag, out of sight, in the boot.
London
#ring-verify
fromNextgov.com
2 months ago

Trust, trade and the new data diplomacy

Data has become the defining currency of global power. The nations and organizations that can manage, protect, and share it responsibly will shape the future of economic resilience and international cooperation. In an era where artificial intelligence and digital interdependence connect every market and mission, the ability to build and maintain trust in data is now a central pillar of both commerce and diplomacy.
World news
fromElectronic Frontier Foundation
1 month ago

The Government Uses Targeted Advertising to Track Your Location. Here's What We Need to Do.

The document acknowledges that a program by the agency to use "commercially available marketing location data" for surveillance drew from the process used to select the targeted ads shown to you on nearly every website and app you visit.
Privacy professionals
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
#brand-protection
Information security
fromForbes
1 month ago

Adapting Brand Protection Strategies In The Age Of AI And Deepfakes

AI and automation have industrialized brand abuse at scale, requiring brands to move beyond manual enforcement to technology-driven defense strategies that match attacker velocity and economics.
Information security
fromForbes
1 month ago

Adapting Brand Protection Strategies In The Age Of AI And Deepfakes

AI and automation have industrialized brand abuse at scale, requiring brands to move beyond manual enforcement to technology-driven defense strategies that match attacker velocity and economics.
fromLondon Business News | Londonlovesbusiness.com
2 months ago

Food safety and compliance: How smart refrigeration protects your business - London Business News | Londonlovesbusiness.com

Refrigeration is one of the most important elements of a successful food safety program, regardless of whether you run a retail operation, catering service or restaurant. Smart refrigeration technologies allow for greater protection against spoilage, reduced time spent monitoring refrigerators/freezers and the ability to provide inspections without the need for manual monitoring. Keep reading to find out how smart refrigeration technology works, and the ways in which it protects your business.
Food & drink
Intellectual property law
fromIPWatchdog.com | Patents & Intellectual Property Law
1 month ago

Other Barks & Bites for Friday, March 6: WIPO Issues PCT Filing Study; CAFC Affirms Use of Unaccused Devices in Royalty Determination; USTR Notorious Markets List Highlights Live Sports Piracy

The Federal Circuit ruled that noninfringing features can be considered in reasonable royalty determinations, allowing damages experts to include unaccused virtual machines in royalty base calculations when causally connected to accused features.
#agentic-commerce
Gadgets
fromTechCrunch
2 months ago

Ring is adding a new content verification feature to videos | TechCrunch

Ring Verify will indicate whether Ring camera videos have been altered, alert recipients to edits, and allow requesting unedited original footage.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
Marketing tech
fromThedrum
1 month ago

Seedtag takes Brand-Safety lead with upgraded image recognition technology

Seedtag upgraded its image-recognition contextual AI to detect 38 categories of dangerous visual content, improving visual brand safety for advertisers and publishers.
fromEntrepreneur
2 months ago

AI Can Delete Your Data. Here's Your Prevention Plan.

Never feel that you are totally safe. In July 2025, one company learned the hard way after an AI coding assistant it dearly trusted from Replit ended up breaching a "code freeze" and implemented a command that ended up deleting its entire product database. This was a huge blow to the staff. It effectively meant that months of extremely hard work, comprising 1,200 executive records and 1,196 company records, ended up going away.
Artificial intelligence
Intellectual property law
fromPatently-O
1 month ago

Guest Post: Design Patents at the ITC

The ITC applied a lower visual similarity standard than the Federal Circuit requires in finding design patent infringement, potentially allowing judges to disregard claimed design elements as minor or trivial.
fromIPWatchdog.com | Patents & Intellectual Property Law
1 month ago

Opinion: The ITC Has Lost Sight of the Public Interest

The U.S. International Trade Commission (ITC)-an agency with the extraordinary power to block imports and, in turn, influence the direction of American technology policy-has drifted out of that balance. To align with the Trump Administration's intellectual property priorities and pro-investment agenda, the ITC is in urgent need of reform.
Intellectual property law
Privacy professionals
fromSilicon Canals
1 month ago

I spent six months tracing where your data actually goes after you click 'Accept All' - what I found is a global supply chain of control that no single regulator can touch - Silicon Canals

Data flows from a single cookie consent click travel through dozens of third-party domains in milliseconds, creating an untraceable global supply chain that existing privacy regulations cannot effectively govern.
Intellectual property law
fromEntrepreneur
1 month ago

Protecting Your Brand in the Age of AI: What Founders Need to Know Now

AI accelerates content creation but does not eliminate legal responsibility; founders must understand copyright, trademark, and IP protections in the AI era to avoid costly mistakes.
fromThe Verge
1 month ago

FTC declines to enforce a kids privacy law for data collected to verify users' ages

Age verification technologies are some of the most child-protective technologies to emerge in decades. Our statement incentivizes operators to use these innovative tools, empowering parents to protect their children online.
Privacy professionals
fromTechRepublic
4 months ago

Ring's Facial-Recognition Feature Sparks Privacy Debate

According to TechCrunch's previous coverage, the feature enables Ring users to recognize visitors' faces and locate lost pets by connecting with neighbors who also use Ring devices. Amazon also rolled out an Alexa+ feature that acts as a smart doorbell assistant, alerting users to a visitor before they open the door. As reported by TechCrunch, Amazon stated that the Familiar Faces feature allows you to create a catalog of up to 50 people by tagging them in the Ring app.
Privacy technologies
Information security
fromTechCrunch
2 months ago

Former Tesla product manager wants to make luxury goods impossible to fake, starting with a chip | TechCrunch

A solution combining hack-proof chips and digital certificates uses integrated hardware and software to authenticate luxury goods and protect brands and buyers.
Information security
fromZDNET
2 months ago

3 security gadgets I never leave home without (and don't break the bank)

Carry an inexpensive kit of physical security tools, like a USB data blocker, to protect devices from malicious chargers, cables, and data theft while traveling.
fromAdExchanger
2 months ago

What The FTC's Focus On Age Verification Means For Privacy | AdExchanger

These days, the internet "looks a hell of a lot more like Las Vegas than 'Little House on the Prairie.'" That's how Andrew Ferguson, chair of the Federal Trade Commission, described the online experience of children in his opening remarks for an FTC workshop on age verification last week. The event took place on Wednesday, January 28, which also happened to be Data Privacy Day, an annual "holiday" of sorts to raise awareness about privacy issues and encourage better data protection practices.
Privacy professionals
fromIPWatchdog.com | Patents & Intellectual Property Law
2 months ago

EUIPO-OECD Joint Study Details Close Link Between Global Counterfeit Trade and Abusive Labor Practices

Yesterday, the European Union Intellectual Property Office (EUIPO) and the Organisation for Economic Co-operation and Development (OECD) published the results of a joint study detailing the close connection between illicit trade in counterfeits and labor exploitation. The joint study shows clear, repeated associations between the intensity of counterfeit trade and abusive labor conditions, strongly suggesting that such conditions structurally enable the production and distribution of counterfeits.
Intellectual property law
#trade-secrets
Intellectual property law
fromThe Drum
2 months ago

Do brands own the copyright on AI-generated ads?

AI-generated brand imagery may lack copyright protection when created with minimal human input, creating legal uncertainty over ownership for marketers.
[ Load more ]