Computers and Video Surveillance

Schneier on Security

Maybe they just recorded, and no one looked at the video unless they needed to. In either case, the video was only stored for a few days because storage was expensive. Identification technologies make it easier to automatically figure out who is in the videos.

Video 93

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template available from IT Governance. Example of IT Governance’s GDPR privacy notice template. The post How to write a GDPR privacy notice – with documentation template example appeared first on IT Governance Blog.

Flaw in Zoom video conferencing software lets sites take over webcam on Mac

Security Affairs

Zoom video conferencing software for Mac is affected by a flaw that could allow attackers to take over webcams when users visit a website. An example of invite link is: [link].

Video 82

The 140 Character Video Is Six Seconds Long

John Battelle's Searchblog

The post The 140 Character Video Is Six Seconds Long appeared first on John Battelle's Search Blog. Twitter announced its integration of Vine today , and to put not too fine a point on it, the service is, in essence, a way to create a video tweet.

Video 106

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Security Affairs

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber crime syndicates. video streams that are viewed). This user seems to at least have permissions to access/view video streams.”

Video 97

New Video Wall: Goods & Services–Businesses in Vancouver

Archives Blogs

Our latest video wall showcases the types of businesses that have operated in the city over time. Many of the photographs used in this video wall show were found in the Stuart Thomson fonds (AM1535), the Jack Lindsay Ltd.

Data Breach Today - Untitled Article

Data Breach Today

You can’t skip video marketing on LinkedIn. The best example would be Gary Vaynerchuk’s videos on LinkedIn. Marketers like Gary fins more innovative ways to attract audiences, thus making a video as a meaningful part of the strategic conversation.

B2B 210

blekko Explains Itself: Exclusive Video (Update: Exclusive Invite)

John Battelle's Searchblog

But then again, there are literally hundreds of thousands of such folks - the entire SEO/SEM industry, for example. For a quick overview of blekko's core feature - "slashtags" - check out the new video, above. blekko: how to slash the web from blekko on Vimeo.

Video 83

Q&A: The drivers behind the stark rise — and security implications — of ‘memory attacks’

The Last Watchdog

For a comprehensive drill down, please view the accompanying YouTube video of my full interview with Leichter and Jakab at RSA 2019’s broadcast alley. And there have been many examples where people have shorted companies that they knew were about to be attacked. For technologists Imminent threats Q & A RSA Podcasts Top Stories Videos

Falling Down an Archival Rabbit Hole: Following the Trail from Finished Film Back to the Research that Inspired It

Unwritten Record

Though it came to the Motion Picture Preservation Lab as a kinescope film, the original source material was definitely video. Learn about the difference between film and video here. )

Take Your Security With You From On-Premises to the AWS Cloud

Data Breach Today

Get expert insight on use cases, plus informative real-world examples plus more about how the cloud services hub/Transit VPC Solution leverages the cloud's scalable network to provide security services throughout the enterprise. Watch this video to learn more

Video 182

The ‘Perfect Storm’ of Disinformation and Hacking


Matt Tait gives a list of examples throughout history where politically motivated groups have used disinformation and hacking as part of a campaign to shape public opinion. Featured Government Hacks Privacy Security Analyst Summit Videos Vulnerabilities Kaspersky Lab Matt Tait

How the New EU Copyright Directive Will Impact Everyone Who Creates Online Content


For example, Article 11 of the EU Copyright Directive doesn’t specifically define the terms “news site” or “snippet,” leaving those details up to individual members.

Video 56

Business Must Change: InfoSec in 2019

The Falcon's View

For example, we should not see large infosec/CISO organizations any more, but instead should see functional technical security resources, such as firewall engineers and appsec engineers, directly embedded into their closest related teams (e.g., For example, instead of riding a project hard to drive to completion, instead ask "Why is this project spec'd to take so long?" infosec leadership-management musings agile devops generativity infosec lean reformation reinvention video

iOS Shortcut for Recording the Police

Schneier on Security

" Hey Siri; I'm getting pulled over " can be a shortcut: Once the shortcut is installed and configured , you just have to say, for example, "Hey Siri, I'm getting pulled over."

Video 103

Machine Learning is Carving the Path toward Digital Transformation


For example, geolocation capabilities in smart phones gave rise to ridesharing services, real-time driving directions and contextual marketing. For example, machine learning algorithms can churn through huge volumes of email and organize messages according to content.

Forget C-I-A, Availability Is King

The Falcon's View

This example, of course, once again highlights how you can view things through a quantitative risk assessment perspective, too. SRE is a perfect example of what happens when you move to a utility computing model and then apply systems and software engineering principles. infosec leadership-management risk-management availability cia confidentiality inforisk integrity video

“Marie Kondo-ing” Your Unstructured Data


Here are some examples: Adobe PDF files. Video surveillance footage. Decluttering Guru Marie Kondo has generated a popular movement of devotees now madly paring down personal belongings that no longer “spark joy.” ” But what if you could take Kondo’s philosophy and apply it to an organization’s mountain of unstructured data?

Survey Finds Machine Learning is Taking Information Governance by Storm


For example, the percentage of organizations using automation to manage non-important content more than quadrupled to 28% from 6% in 2013. They face a huge backlog of “undigested” content, such as images, video and email messages that don’t easily fit into structured data formats. Judging by the results of a new survey, machine learning software is rapidly becoming the records manager’s best new friend.

US Journalist Detained When Returning to US

Schneier on Security

After I gave him the password to my iPhone, Moncivias spent three hours reviewing hundreds of photos and videos and emails and calls and texts, including encrypted messages on WhatsApp, Signal, and Telegram.

Parents’ Guide for Safe YouTube and Internet Streaming for Kids

Security Affairs

But did you know that YouTube allows comments on most videos and that those comments sections can contain links posted by predatory adults hiding behind fake profiles? What does this have to do with streaming videos? Check their video history from time to time.

Video 98

The view from the trenches. | ZDNet

Collaboration 2.0

strategy and tactics, here’s an example of some realities from a client side perspective. strategy and tactics, here’s an example of some realities from a client side perspective.

Broadcast or communicate? | ZDNet

Collaboration 2.0

A fascinating example for me is that while most of the world was busy building out telephone communications infrastructure, the Soviets chose to focus on installing loudspeakers everywhere.

A Considerable Insight into your Data | Capture, Organize, Store and Deliver rich media assets with everteam.iNSight


The size of Data might be an issue but the biggest challenge is the multiple data streams coming from online sources and social media, bringing rich media assets such as images, videos, animations, documents, etc.….

A Considerable Insight into your Data | Capture, organize, store and deliver rich media assets with everteam.iNSight


The size of Data might be an issue but the biggest challenge is the multiple data streams coming from online sources and social media, bringing rich media assets such as images, videos, animations, documents, etc.….

Video 83

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

iLnkP2p is bundled with millions of Internet of Things (IoT) devices, including security cameras and Webcams, baby monitors, smart doorbells, and digital video recorders.

IoT 251

Android 7.0+ Phones Can Now Double as Google Security Keys

Krebs on Security

This capability was described in far greater visual detail in this video last year by Christiaan Brand , product manager at Google Cloud. Google this week made it easier for Android users to enable strong 2-factor authentication (2FA) when logging into Google’s various services.

Here's Why Your Static Website Needs HTTPS

Troy Hunt

Even the government has been pushing to drive adoption of HTTPS for all sites, for example in this post by the National Cyber Security Centre in the UK : all websites should use HTTPS, even if they don't include private content, sign-in pages, or credit card details.

Demo 114

Who’s Behind the GandCrab Ransomware?

Krebs on Security

For example, in late July 2018, GandCrab crowed that a single affiliate of the ransomware rental service had infected 27,031 victims in the previous month alone, receiving about $125,000 in commissions.

PayPal's Beautiful Demonstration of Extended Validation FUD

Troy Hunt

The ensuing discussion after that tweet reminded me that I really must check back in on what I suspect may be the single most significant example of why EV has become little more than a useless gimmick today. Here's the exact moment deep-linked in the recorded video: Well that was unexpected.

Dutch DPA Expands Guidance on Data Breaches

Hunton Privacy

Such tools include videos and information sheets with tips on how to maintain a data breach register, a step-by-step plan to take action in the event of a breach, and a list of examples indicating whether or not a data breach is notifiable. On July 1, 2019, the Dutch Data Protection Authority ( Autoriteit Persoonsgegevens , (the “Dutch DPA”)) announced that it had expanded its guidance on data breaches.

Jive Clearspace 2.5: increasingly sophisticated social productivity tools | ZDNet

Collaboration 2.0

This latest release builds on a solid foundation, and has many new features and enhancements, as the above video illustrates. This latest release builds on a solid foundation, and has many new features and enhancements, as the above video illustrates.

GUEST ESSAY: Six risks tied to social media marketing that all businesses should heed

The Last Watchdog

For example, of someone who is not a customer leaves a bad review, then responding with this information is fine. 3: Faux Pas It can be easy to accidentally say the wrong thing on social media and ignite a frenzied response which could damage your brand, risky humour for example can backfire spectacularly. For example, some relatively minor changes to the Instagram feed algorithm can have a dramatic impact on your online visibility.

United Airlines covers up seat cameras to respond to privacy concerns

Security Affairs

gaming , video conferencing). “As The cameras are a standard feature that manufacturers of the system included for possible future purposes such as video conferencing.”

Video 79

Understanding the online safety and privacy challenges faced by South Asian women


For example, gender norms might result in a mother sharing her phone with her childrens (whereas the father might not). For example, Qandeel Baloch, a social media celebrity in Pakistan, was. a daughter might search for and then play a video for her mother). For example, a.

Video 72

“Stole $24 Million But Still Can’t Keep a Friend”

Krebs on Security

“Over the next few months, Nick and I socialized at nightclubs, local bars, the gym, and in his apartment playing video games,” David recounted. For example, once at a crowded lounge, he said: ‘Chris, I have more money than all of the people here tonight.'”

The Year Targeted Phishing Went Mainstream

Krebs on Security

The sextortion scheme that emerged this month falsely claims to have been sent from a hacker who’s compromised your computer and used your webcam to record a video of you while you were watching porn.

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

Here’s how Jay Stanley, senior policy analyst for the American Civil Liberties Union , described it for me: “Right now everybody knows that when you walk down the street you’re recorded by a lot of video cameras, and that the video will just sit on some hard drive somewhere and nothing really happens to it unless something dramatic goes down. It combines commodity video surveillance cameras and PCs with facial recognition software supplied by RealNetworks.

Courts Hand Down Hard Jail Time for DDoS

Krebs on Security

Seldom do people responsible for launching crippling cyberattacks face justice, but increasingly courts around the world are making examples of the few who do get busted for such crimes.

IoT 184

French Data Protection Authority Publishes Opinion Regarding New Security Bill

Hunton Privacy

While the CNIL’s Opinion was taken into account with respect to several key recommendations (for example, the bill expands the CNIL’s authority to monitor the use of CCTV cameras in public areas), the CNIL is concerned about privacy protection in other areas. European Union Identity Theft International Online Privacy CCTV CNIL France Video Surveillance