Search

 

Technology Law

Economou & Economou Law Office > Blog  > Technology Law

EU AI Act: first regulation on artificial intelligence

The EU just passed sweeping new rules to regulate AI. The European Union agreed on terms of the AI Act, a major new set of rules that will govern the building and use of AI and have major implications for Google, OpenAI, ChatGPT, and other racing to develop AI systems. The 36-hour negotiation marathon that resulted in the finalization of the European Union's comprehensive AI regulations comes with a catch: until the regulations take effect in 2025, the EU will remain in a legal vacuum. Why this matters Much like it did with digital privacy laws, the EU is once again...

Continue reading

Top 10 rules for safe digital transactions

1. The main "shield" protecting consumers is the passwords they use. Users should set complex passwords, which contain, among other things, lowercase characters, numbers and symbols and do not consist of easily accessible elements such as their name. It is also important that they do not store their passwords on any of their devices, nor in the browsers they use. To avoid fraud and theft of their passwords, users are advised to change them every three to six months, but also to avoid sharing them with third parties, or using them on unofficial sites of online shops and banking institutions. 2....

Continue reading

How fraudsters commit cyber crimes?

We answer to your most frequent questions regarding electronic - banking frauds In which way the scammers manage to empty your bank accounts? You must first have the depositor's login codes in order to access their electronic banking account. Moreover, the fraudster requires the one-time password in order to move the depositor's funds from his account to an account owned by a third party. The criminals use social engineering and phishing as their two main techniques to obtain all the information mentioned above. The perpetrators typically obtain the login codes by sending us false emails or texts pretending to be the bank...

Continue reading

Introduction to Cybercrime

We have been living through the last phase of the industrial revolution's shift to the digital revolution in recent years. Undoubtedly, modern knowledge is advancing at such a rapid rate that our civilization is sadly unable to keep up with them. The fundamental reason for this phenomena is the disconnect between our understanding of technology and its advancements. The cellphones that are utilized by the great majority of our fellow humans serve as a typical illustration. These technical marvels, whose entire scope is unknown to us, have managed to "monopolize" the center of our daily lives. They are astonishing in...

Continue reading

The safety issues of Deepfake Technology

In recent years there has been an evolution in the applications found in the digital smartphone app stores and any user with minimal knowledge can make use of the technology based on any facial photo and add voice, including perpetrators who deceive users to steal their personal information such as bank accounts through social network accounts without the consent of the users themselves. Several apps for identity purposes such as banking or eGovernment apps ask the users to take a photo of their face in special lighting conditions and from multiple sides. The reason why it becomes more difficult to detect fraudsters...

Continue reading