article thumbnail

Google Is Not Deleting Old YouTube Videos

Schneier on Security

Google has backtracked on its plan to delete inactive YouTube videos—at least for now. Of course, it could change its mind anytime it wants. It would be nice if this would get people to think about the vulnerabilities inherent in letting a for-profit monopoly decide what of human creativity is worth saving.

IT 87
article thumbnail

Zoom Reverses Course, Removes Local Web Server

Data Breach Today

Controversial Design Decision Could Allow for an Ambush Video Call Video conferencing vendor Zoom has opted to make major changes to its Mac application after a security researcher found several weaknesses in it.

Security 176
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Secure Together: video conferencing, credential stuffing and eye strain

IT Governance

Maybe you feel less guilty about having a mid-morning video chat with a colleague in lieu of your normal coffee break. The video conferencing platform Zoom has been heavily criticised in recent weeks , amid a series of allegations related to its inadequate cyber security and privacy measures. Cyber attacks. Expert advice.

Security 124
article thumbnail

News alert: Security Journey accelerates secure coding training platform enhancements

The Last Watchdog

Pittsburgh, PA – July 13, 2023 – Security Journey, a best-in-class application security education company, has today announced an acceleration of its secure coding training platform enhancements. undergraduate computer science programs mandate courses in application security.

Security 170
article thumbnail

Alleged Grand Theft Auto 6 (GTA6) gameplay videos and source code leaked online

Security Affairs

Threat actors leaked source code and gameplay videos of Grand Theft Auto 6 (GTA6) after they have allegedly breached Rockstar Game. Threat actors allegedly compromised Rockstar Game’s Slack server and Confluence wiki and leaked Grand Theft Auto 6 gameplay videos and source code. The footage is early and unfinished, of course.

Sales 87
article thumbnail

Security Vulnerability of Switzerland’s E-Voting System

Schneier on Security

Like any internet voting system, it has inherent security vulnerabilities: if there are malicious insiders, they can corrupt the vote count; and if thousands of voters’ computers are hacked by malware, the malware can change votes as they are transmitted. And of course, that’s part of the problem! Again, the solution is paper.

Paper 121
article thumbnail

Episode 257: Securing Software on Wheels with

The Security Ledger

In this episode of The Security Ledger Podcast (#257) Paul speaks with Dennis Kengo Oka, a senior principal automotive security strategist at the firm Synopsys about the growing cyber risks to automobiles as connected vehicle features proliferate in the absence of strong cybersecurity protections. Read the whole entry. »