Source: Android Headlines
https://www.androidheadlines.com/2024/09/google-sued-over-ai-driven-tool-for-customer-service-call-review.html
By now, it’s no secret that Google is fully committed to AI. The company has integrated the power of LLMs into multiple apps and services. One of those is a platform that helps other companies streamline customer service tasks by analyzing calls. That said, an individual filed a lawsuit against Google for listening to his calls with a Home Depot agent. Recently, Google’s name appeared in another potential conversation-listening case.Individual files lawsuit against Google for call listening using AI tools
AI makes it possible to automate multiple processes and facilitate others. Regarding calls, we have seen that it is capable of generating summaries with key points, or even suggesting potential replies. These types of capabilities are especially useful for customer service agents. With that in mind, Google developed the Contact Center AI (CCAI) platform. Any external company can turn to CCAI if it wants to enhance the performance of its customer service agents. CCAI can help offer faster responses or better understand customer requirements.
That said, it seems that some people aren’t particularly comfortable with an “entity” listening to their calls.
Listening was happening in real-time
Call-analysis platforms for customer service are not new. Even before AI, these platforms existed, but they relied on humans and recorded calls. However, some may find the feeling of an AI listening to them in real-time intimidating.
…
Filed: https://www.androidheadlines.com/category/tech-news
Source: NewsNation via NXSTTV
https://www.nxsttv.com/nmw/news/ai-music-producer-accused-of-bilking-music-streamers-for-millions/
- Justice Department says man created thousands of AI songs
- Bots would continually stream the songs, generating royalties
- Streaming companies allegedly defrauded of $10 million
(NewsNation) — A North Carolina man has been charged with defrauding music streaming services to the tune of $10 million in royalty payments for using artificial intelligence to not only make music but to “listen” to those songs.
Michael Smith, 52, “played upon the integrity of the music industry by a concerted attempt to circumvent the streaming platforms’ policies,” said FBI Acting Assistant Director Christie M. Curtis.
Music streaming platforms such as Spotify, Amazon Music and Apple Music pay royalties to composers, musicians and those who hold the rights to songs. The payments are based on how many times the songs are streamed by people around the world.
Smith then allegedly expanded the scheme on the assumption that a billion fake streams of tens of thousands of songs would be more difficult to detect since each song was being streamed fewer times.
…
Subject: Phishing Attack Takes a Two-Step Approach to Leverage Legitimate Sites and Evade Detection
Source:
https://blog.knowbe4.com/phishing-attack-takes-a-two-step-approach-to-leverage-legitimate-sites-and-evade-detection
[infomercial of interest … ]
Analysis of a new phishing attack demonstrates how attackers may take a longer path to reach their malicious goals while staying “under the radar” of security products.
It would be pretty simple to create a phishing attack that sends its’ victims a brand-impersonated email with a link that takes you to an impersonated webpage that asks for credentials, personal details or credit card information.
But many of today’s security products will detect the impersonation immediately. So, if you’re a cybercriminal developing a cunning phishing scam, you need to find ways to avoid being detected – even if it means adding a few unnecessary steps.
And that’s exactly what we find in security vendor Perception Point’s latest analysis of a phishing attack that uses Microsoft Office Forms as an intermediate step in their phishing scam. According to the analysis, the phishing email impersonates a well-known brand (such as Microsoft 365 below) with the first step being the clicking of a link within the email that points to an Office form.
Source: Quartz
https://qz.com/us-release-export-controls-chips-ai-quantum-computing-1851641981
The Biden administration announced new export controls on critical technologies, including semiconductors and quantum computersThe U.S. has released its latest set of export controls on critical technologies as it steps up its efforts to curb China’s technological advances.
The new export controls cover quantum computing, aerospace technology, and semiconductors, which “warrant export controls because of national security concerns,” the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) said. The rules, which were released Friday and don’t explicitly name certain countries, “are the product of extensive discussions with international partners,” and are being adopted as military applications enabled by critical technologies “emerge and evolve,” said BIS.
Meanwhile, the Dutch government announced it is expanding export control measures related to advanced semiconductor manufacturing equipment, specifically deep ultraviolet lithography equipment, which is manufactured by Netherlands-based ASML. The change announced Friday gives the Dutch government control over ASML’s exports of its machines to other countries, which the U.S. had done.
…
Filed: https://qz.com/business-news/generation-ai
Subject: Reolink’s battery-powered security camera can record for days without subscription fees
Source: The Verge
https://www.theverge.com/2024/9/6/24235858/reolink-atlas-pt-ultra-security-camera-battery-smart-home-doorbell
Having to charge the camera every week does negate some of the convenience of it being battery-powered, but through desktop and mobile apps, the Altas PT Ultra can be programmed to only capture video when motion is detected by its passive infrared sensor, or on a specific schedule, to extend its battery life. When set to its “standard working mode,” Reolink says the camera can run for up to 16 months on a single charge….
Source: Bleeping Computer
https://www.bleepingcomputer.com/news/security/new-rambo-attack-steals-data-using-ram-in-air-gapped-computers/
A novel side-channel attack dubbed “RAMBO” (Radiation of Air-gapped Memory Bus for Offense) generates electromagnetic radiation from a device’s RAM to send data from air-gapped computers.Air-gapped systems, typically used in mission-critical environments with exceptionally high-security requirements, such as governments, weapon systems, and nuclear power stations, are isolated from the public internet and other networks to prevent malware infections and data theft.
Although these systems are not connected to a broader network, they can still be infected by rogue employees introducing malware through physical media (USB drives) or sophisticated supply chain attacks carried out by state actors.
The malware can operate stealthily to modulate the air-gapped system’s RAM components in a way that allows the transfer of secrets from the computer to a recipient nearby.
The latest method that falls into this category of attacks comes from Israeli university researchers led by Mordechai Guri, an experienced expert in covert attack channels who previously developed methods to leak data using network card LEDs, USB drive RF signals, SATA cables, and power supplies.
How the RAMBO attack works – To conduct the Rambo attack, an attacker plants malware on the air-gapped computer to collect sensitive data and prepare it for transmission. It transmits the data by manipulating memory access patterns (read/write operations on the memory bus) to generate controlled electromagnetic emissions from the device’s RAM.
…
Stopping RAMBO – The technical paper published on Arxiv provides several mitigation recommendations to mitigate the RAMBO attack and similar electromagnetic-based covert channel attacks, but they all introduce various overheads.
…
Tagged: