Computers and Video Surveillance

Schneier on Security

Maybe they just recorded, and no one looked at the video unless they needed to. In either case, the video was only stored for a few days because storage was expensive. Identification technologies make it easier to automatically figure out who is in the videos.

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template available from IT Governance. Example of IT Governance’s GDPR privacy notice template. The post How to write a GDPR privacy notice – with documentation template example appeared first on IT Governance Blog.


Flaw in Zoom video conferencing software lets sites take over webcam on Mac

Security Affairs

Zoom video conferencing software for Mac is affected by a flaw that could allow attackers to take over webcams when users visit a website. An example of invite link is: [link].

EDPB Adopts Guidelines on Data Processing Through Video Devices

Hunton Privacy

The European Data Protection Board (the “EDPB”) recently adopted its Guidelines 3/2019 on processing of personal data through video devices (the “Guidelines”). Although the Guidelines provide examples of data processing for video surveillance, these examples are not exhaustive. The Guidelines aim to provide guidance on how to apply the EU General Data Protection Regulation (“GDPR”) in all potential areas of video device use.


Amazon’s Ring Video Doorbell could open the door of your home to hackers

Security Affairs

Bitdefender discovered a high-severity security flaw in Amazon’s Ring Video Doorbell Pro devices that could allow nearby attackers to steal WiFi password. SecurityAffairs – IoT , Amazon’s Ring Video Doorbell).

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Security Affairs

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber crime syndicates. video streams that are viewed). This user seems to at least have permissions to access/view video streams.”

Cloud 111

BCGLA Video and Audio now online!

Archives Blogs

The Archives is very happy to announce that over 150 audio and video files from the BC Gay and Lesbian Archives (BCGLA) are now available online. The BCGLA Audiovisual Recordings series consists of 43 audio tapes and 93 video tapes. A selection of audio and video tapes from the BCGLA.

New Video Wall: Goods & Services–Businesses in Vancouver

Archives Blogs

Our latest video wall showcases the types of businesses that have operated in the city over time. Many of the photographs used in this video wall show were found in the Stuart Thomson fonds (AM1535), the Jack Lindsay Ltd.

Social business is more than adding a social layer: A banking example


I suspect they could do more in the interim, as one of the NAB anecdotes in the video suggest. For example, another second tier Australian bank is also talking about overhauling their core banking systems.

Cloud 76

blekko Explains Itself: Exclusive Video (Update: Exclusive Invite)

John Battelle's Searchblog

But then again, there are literally hundreds of thousands of such folks - the entire SEO/SEM industry, for example. For a quick overview of blekko's core feature - "slashtags" - check out the new video, above. blekko: how to slash the web from blekko on Vimeo.

Data Breach Today - Untitled Article

Data Breach Today

You can’t skip video marketing on LinkedIn. The best example would be Gary Vaynerchuk’s videos on LinkedIn. Marketers like Gary fins more innovative ways to attract audiences, thus making a video as a meaningful part of the strategic conversation.

B2B 224

Q&A: The drivers behind the stark rise — and security implications — of ‘memory attacks’

The Last Watchdog

For a comprehensive drill down, please view the accompanying YouTube video of my full interview with Leichter and Jakab at RSA 2019’s broadcast alley. And there have been many examples where people have shorted companies that they knew were about to be attacked. For technologists Imminent threats Q & A RSA Podcasts Top Stories Videos

Falling Down an Archival Rabbit Hole: Following the Trail from Finished Film Back to the Research that Inspired It

Unwritten Record

Though it came to the Motion Picture Preservation Lab as a kinescope film, the original source material was definitely video. Learn about the difference between film and video here. )

The ‘Perfect Storm’ of Disinformation and Hacking


Matt Tait gives a list of examples throughout history where politically motivated groups have used disinformation and hacking as part of a campaign to shape public opinion. Featured Government Hacks Privacy Security Analyst Summit Videos Vulnerabilities Kaspersky Lab Matt Tait

Take Your Security With You From On-Premises to the AWS Cloud

Data Breach Today

Get expert insight on use cases, plus informative real-world examples plus more about how the cloud services hub/Transit VPC Solution leverages the cloud's scalable network to provide security services throughout the enterprise. Watch this video to learn more

Cloud 193

High Court Dismisses Challenge to Police Use of Facial Recognition Technology

Hunton Privacy

It was only deployed for a limited period, for a specific purpose, and was publicized before its use (for example, on Facebook and Twitter). Enforcement European Union International Data Protection Act DPIA EU Regulation Facial Recognition Technology Information Commissioners Office United Kingdom Video SurveillanceOn September 4, 2019, the High Court of England and Wales dismissed a challenge to South Wales Police’s use of Automated Facial Recognition technology (“AFR”).

iOS Shortcut for Recording the Police

Schneier on Security

" Hey Siri; I'm getting pulled over " can be a shortcut: Once the shortcut is installed and configured , you just have to say, for example, "Hey Siri, I'm getting pulled over."

IT 114

Overcoming the Challenge of Unstructured Information


A spreadsheet is a simple example of this. Each of these simple examples might be created or captured in a variety of formats. It can also be extracted through some sort of structured output from another system – for example, an HR or accounting application. A common example is email. Rich media like audio, video, photographs and infographics constitute an increasingly important type of enterprise content that must be managed.

Business Must Change: InfoSec in 2019

The Falcon's View

For example, we should not see large infosec/CISO organizations any more, but instead should see functional technical security resources, such as firewall engineers and appsec engineers, directly embedded into their closest related teams (e.g., For example, instead of riding a project hard to drive to completion, instead ask "Why is this project spec'd to take so long?" infosec leadership-management musings agile devops generativity infosec lean reformation reinvention video

Forget C-I-A, Availability Is King

The Falcon's View

This example, of course, once again highlights how you can view things through a quantitative risk assessment perspective, too. SRE is a perfect example of what happens when you move to a utility computing model and then apply systems and software engineering principles. infosec leadership-management risk-management availability cia confidentiality inforisk integrity video

The view from the trenches. | ZDNet

Collaboration 2.0

strategy and tactics, here’s an example of some realities from a client side perspective. strategy and tactics, here’s an example of some realities from a client side perspective.

Paper 52

Broadcast or communicate? | ZDNet

Collaboration 2.0

A fascinating example for me is that while most of the world was busy building out telephone communications infrastructure, the Soviets chose to focus on installing loudspeakers everywhere.

Dark Web Site Taken Down without Breaking Encryption

Schneier on Security

This was all accomplished not through any backdoors in communications systems, but by analyzing the bitcoin transactions and following the money : Welcome to Video made money by charging fees in bitcoin, and gave each user a unique bitcoin wallet address when they created an account.

US Journalist Detained When Returning to US

Schneier on Security

After I gave him the password to my iPhone, Moncivias spent three hours reviewing hundreds of photos and videos and emails and calls and texts, including encrypted messages on WhatsApp, Signal, and Telegram.

Mining 114

Creating a data flow diagram

Perficient Data & Analytics

For example, user input (low trust) from a web site crosses a boundary when the front-end passes it to the back-end (higher trust). In this video, I give a demonstration of how to create a DFD. A data flow diagram (DFD) documents the path data takes throughout your process/system.

Paper 69

Neo-Nazi SWATters Target Dozens of Journalists

Krebs on Security

” The Doxbin is tied to an open IRC chat channel in which the core members discuss alt-right and racist tropes, doxing and swatting people, and posting videos or audio news recordings of their attacks.

Parents’ Guide for Safe YouTube and Internet Streaming for Kids

Security Affairs

But did you know that YouTube allows comments on most videos and that those comments sections can contain links posted by predatory adults hiding behind fake profiles? What does this have to do with streaming videos? Check their video history from time to time.

How the New EU Copyright Directive Will Impact Everyone Who Creates Online Content


For example, Article 11 of the EU Copyright Directive doesn’t specifically define the terms “news site” or “snippet,” leaving those details up to individual members.

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

iLnkP2p is bundled with millions of Internet of Things (IoT) devices, including security cameras and Webcams, baby monitors, smart doorbells, and digital video recorders.

IoT 286

White hat hacker demonstrated how to hack a million Instagram accounts

Security Affairs

The photo and video-sharing social networking service implemented a mechanism that prevents brute-force attacks aimed at obtaining this code. In the past, Muthiyah also received other rewards from Facebook for flaws that could have been exploited to delete videos and delete a user’s photos.

Android 7.0+ Phones Can Now Double as Google Security Keys

Krebs on Security

This capability was described in far greater visual detail in this video last year by Christiaan Brand , product manager at Google Cloud. Google this week made it easier for Android users to enable strong 2-factor authentication (2FA) when logging into Google’s various services.

A Considerable Insight into your Data | Capture, Organize, Store and Deliver rich media assets with everteam.iNSight


The size of Data might be an issue but the biggest challenge is the multiple data streams coming from online sources and social media, bringing rich media assets such as images, videos, animations, documents, etc.….

The Year Targeted Phishing Went Mainstream

Krebs on Security

The sextortion scheme that emerged this month falsely claims to have been sent from a hacker who’s compromised your computer and used your webcam to record a video of you while you were watching porn.

A Considerable Insight into your Data | Capture, organize, store and deliver rich media assets with everteam.iNSight


The size of Data might be an issue but the biggest challenge is the multiple data streams coming from online sources and social media, bringing rich media assets such as images, videos, animations, documents, etc.….

GUEST ESSAY: Six risks tied to social media marketing that all businesses should heed

The Last Watchdog

For example, of someone who is not a customer leaves a bad review, then responding with this information is fine. 3: Faux Pas It can be easy to accidentally say the wrong thing on social media and ignite a frenzied response which could damage your brand, risky humour for example can backfire spectacularly. For example, some relatively minor changes to the Instagram feed algorithm can have a dramatic impact on your online visibility.

Here's Why Your Static Website Needs HTTPS

Troy Hunt

Even the government has been pushing to drive adoption of HTTPS for all sites, for example in this post by the National Cyber Security Centre in the UK : all websites should use HTTPS, even if they don't include private content, sign-in pages, or credit card details.

Courts Hand Down Hard Jail Time for DDoS

Krebs on Security

Seldom do people responsible for launching crippling cyberattacks face justice, but increasingly courts around the world are making examples of the few who do get busted for such crimes.

IoT 285