Video Game Streamer 'Twitch' Confirms Massive Data Breach

Data Breach Today

Reports: Platform's Entire Source Code Compromised in 125GB Leak Amazon-owned video streaming service Twitch, which focuses on video games and e-sports broadcasts, reportedly suffered a massive data breach, which the company vaguely confirmed via Twitter.

Iranian Hackers Accidentally Exposed Training Videos

Data Breach Today

IBM: Videos Detail Attacks on US Navy and State Department Personnel An Iranian-backed hacking group appears to have accidentally left over 40 GB of training videos and other material exposed online, according to researchers with IBM who found the unprotected server.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Countries Team Up to Issue Video Teleconference Guidance

Data Breach Today

information Commissioner’s Office to issue guidance to video teleconferencing companies on privacy, calling for end-to-end encryption

How Deepfakes Can Defeat Video ID Verification Tests

Data Breach Today

Ilya Volovik of Gemini Advisory Describes Research Findings Banking institutions, cryptocurrency exchanges and other companies have begun implementing video-based identity verification.

The Woman Bulldozing Video Games’ Toughest DRM

WIRED Threat Level

Security Security / Security News Culture / Video GamesFor Empress, cracking titles like Red Dead Redemption 2 and Immortals Fenyx Rising is more than a pastime. It's a mission.

IT 99

Google experts found 2 flaws in video conferencing software Zoom

Security Affairs

Google Project Zero researchers have discovered two vulnerabilities in the video conferencing software Zoom that expose users to attacks. Security researchers from Google Project Zero discovered two vulnerabilities in the video conferencing software Zoom that expose users to attacks.

Video Conference Firm Targeted for Payment Card Skimming

Data Breach Today

Malwarebytes Says PlayBack Now Customer Sites Compromised While most payment card skimming attacks zero in on ecommerce sites for consumers, a newly discovered attack targeted PlayBack Now, an online video conferencing firm, Malwarebytes reports

Introducing Jamf How-to Video Shorts

Jamf

Check out Jamf how-to video shorts for no-nonsense training and support tutorials from your Jamf Customer Success team

52

2-Step Email Attack Uses Powtoon Video to Execute Payload

Dark Reading

The attack uses hijacked Egress branding and the legit Powtoon video platform to steal user credentials

66

7 Considerations for a Smooth Video Conference

IG Guru

The post 7 Considerations for a Smooth Video Conference appeared first on IG GURU. by Andrew Ysasi, MS June 24, 2020 Many of us have transitioned to working from home due to COVID-19, and some of us may not return to an office setting for quite some time.

Risk 83

7 Tips for Video Interviews

Adapture

7 Tips for Video Interviews. 2020 certainly taught us how to live life behind the lens of a video conferencing camera. Today we’ve got a few video-specific tips to keep in mind so you can nail your next interview. Eve contact is tricky on video, but it’s possible.

IT 52

Russia’s disinformation uses deepfake video of Zelenskyy telling people to lay down arms

Security Affairs

Russian disinformation continues, this time it used a deepfake video of Zelenskyy inviting Ukrainians to ‘lay down arms.’ ” the President says in the fake video. The video became viral on social media, including Facebook.

Stealing videos from VLC

Security Affairs

Technical analysis: Let’s assume a scenario where Bob & Alice are sharing a video over the WiFi using vlc-iOS, Eve could perform this attack by crawling the source IP address of Bob which would list the URL’s of the videos shared between Bob & Alice.

Published Zelenskyy Deepfake Video Demonstrates the Modern War is Online

KnowBe4

The video uploaded to a hacked Ukrainian news website shows how far the technology has come, how it can be used in social engineering , as well as how the tech still needs to improve.

IT 97

Video series

Adam Shostack

It will come as no surprise to regular readers of this blog that I prefer the written word to audio and video, but 2020 being 2020, I now have a YouTube Channel , with the first video below: threat modeling

IT 40

Dutch tech reporter gatecrashes EU defence secret video conference

Security Affairs

A Dutch tech reporter gatecrashed a video conference of EU defence ministers after the Dutch minister shared an image on Twitter. The post Dutch tech reporter gatecrashes EU defence secret video conference appeared first on Security Affairs.

Video-Game Piracy Group ‘Team Xecuter’ Leaders in Custody

Threatpost

The two alleged leaders of Team Xecuter targeted popular consoles like the Nintendo Switch, the Sony PlayStation Classic and Microsoft Xbox.

Video Conferencing Apps Sometimes Ignore the Mute Button

Schneier on Security

A Privacy Analysis of Mute Buttons in Video Conferencing Apps “: Abstract: In the post-pandemic era, video conferencing apps (VCAs) have converted previously private spaces — bedrooms, living rooms, and kitchens — into semi-public extensions of the office.

Criminals Use Deepfake Videos to Interview for Remote Work

Dark Reading

The latest evolution in social engineering could put fraudsters in a position to commit insider threats

107
107

Detecting Fake Videos

Schneier on Security

This story nicely illustrates the arms race between technologies to create fake videos and technologies to detect fake videos: These fakes, while convincing if you watch a few seconds on a phone screen, aren't perfect (yet). But a few weeks after his team put a draft of their paper online, they got anonymous emails with links to deeply faked YouTube videos whose stars opened and closed their eyes more normally. academicpapers behavioraldetection fraud video

Paper 57

Anker fixed an issue that caused access to Eufy video camera feeds to random users

Security Affairs

A misconfiguration issue in the software used by the Eufy video camera exposed private information and video streams of customers. Some users reported that once signed into their accounts, they were able to access the live feeds of other users’ Eufy security cameras and recorded video.

Computers and Video Surveillance

Schneier on Security

Maybe they just recorded, and no one looked at the video unless they needed to. In either case, the video was only stored for a few days because storage was expensive. Recent developments in video analytics -- fueled by artificial intelligence techniques like machine learning -- enable computers to watch and understand surveillance videos with human-like discernment. Identification technologies make it easier to automatically figure out who is in the videos.

SHARED INTEL: ‘Credential stuffers’ leverage enduring flaws to prey on video game industry

The Last Watchdog

The video game industry saw massive growth in 2020; nothing like a global pandemic to drive people to spend more time than ever gaming. The video game industry withstood nearly 11 billion credential stuffing attacks in 2020, a 224 percent spike over 2019. LW: Is what Akamai tracked in 2020, with respect to video game industry attacks, a sign of more credential stuffing refinements and advancements yet to come?

Video Surveillance by Computer

Schneier on Security

The ACLU's Jay Stanley has just published a fantastic report: " The Dawn of Robot Surveillance " (blog post here ) Basically, it lays out a future of ubiquitous video cameras watched by increasingly sophisticated video analytics software, and discusses the potential harms to society.

A Site Published Every Face From Parler's Capitol Riot Videos

WIRED Threat Level

Faces of the Riot used open source software to detect, extract, and deduplicate every face from the 827 videos taken from the insurrection on January 6.

Amazon Handed Ring Videos to Cops Without Warrants

WIRED Threat Level

Plus: A wild Indian cricket scam, an elite CIA hacker is found guilty of passing secrets to WikiLeaks, and more of the week's top security news. Security Security / Cyberattacks and Hacks Security / Privacy

Senators Press Social Media Firms to Fight 'Deepfake' Videos

Data Breach Today

senators Mark Warner and Marco Rubio are urging social media firms to create policies and standards to combat the spread of "deepfake" videos, which they say pose a potential threat to American democracy Warner and Rubio Want Companies to Develop Standards and Policies to Combat Fakes U.S.

Determining What Video Conference Participants Are Typing from Watching Shoulder Movements

Schneier on Security

He says the “text inference framework that uses the keystrokes detected from the video … predict[s] words that were most likely typed by the target user. Uncategorized academic papers side-channel attacks video

MER Releases Video Messages on Attendee Safety for MER 2022

IG Guru

Check out the videos here. The post MER Releases Video Messages on Attendee Safety for MER 2022 appeared first on IG GURU. IG News MER Sponsored Attendee Safety COVID MER 2022

68

Top 5 Video Marketing Tools to Boost Your Sales

Cllax

It’s 2022, and videos are the most popular content you can find on the internet. Wherever you go, you’ll discover some short video content here and there, be it on. The post Top 5 Video Marketing Tools to Boost Your Sales first appeared on Cllax - Top of IT.

Sales 41

An RCE in Annke video surveillance product allows hacking the device

Security Affairs

Researchers from Nozomi Networks discovered a critical vulnerability that can be exploited to hack a video surveillance product made by Annke. The device allows customers to watch live video streams, manage cameras, and store video captured by cameras.

Face Off: Researchers Battle AI-Generated Deep Fake Videos

Data Breach Today

Convincing Face-Swapping Clips Easy to Create With Gaming Laptops and Free Tools The easy availability of tools for designing face-swapping deep-fake videos drove Symantec security researchers Vijay Thaware and Niranjan Agnihotri to design a tool for spotting deep fakes, which they described in a briefing at the Black Hat Europe 2018 conference in London

Who Else Is in That Video Meeting? Maybe a Hacker

Data Breach Today

Forescout Finds Serious Flaws in DTEN Conferencing Systems Video conferencing and collaboration systems are must-have tools for global companies.

Capturing customer attention with video

OpenText Information Management

Consumers now spend over 3 hours per day on … The post Capturing customer attention with video appeared first on OpenText Blogs. Customers today have a lot of choices and are exposed to over 5,000 brand and advertising impressions a day.

YouTube SEO: How to Rank YouTube Videos in 2023

Cllax

The post YouTube SEO: How to Rank YouTube Videos in 2023 first appeared on Cllax - Top of IT. Let’s begin with who doesn’t use YouTube in this day and age? Everyone uses YouTube religiously as they do with the Google search box. No matter what occasion they want.

IT 41

‘Friends’ Reunion Anchors Video Swindle

Threatpost

Spam was on the rise in Q2, with video fraud and COVID-19-related efforts in the mix. Cloud Security Most Recent ThreatLists Web Security

Cloud 71

Fast threat modeling videos

Adam Shostack

I’m exploring the concept of very fast threat modeling videos, and have posted the first one. Feedback welcome! Threat Model Thursdays threat modeling

40

How to fill a public records request: Common Council committee meeting video

Preservica

Welcome to the "How we do it" Video Series. If you are a Clerk, Records Manager or Archivist for City or County Government, our practical “How we do it” videos are for you! This educational series will regularly feature new video assets.

Using Machine Learning to Guess PINs from Video

Schneier on Security

Researchers trained a machine-learning system on videos of people typing their PINs into ATMs: By using three tries, which is typically the maximum allowed number of attempts before the card is withheld, the researchers reconstructed the correct sequence for 5-digit PINs 30% of the time, and reached 41% for 4-digit PINs.

Facebook declares war to Deepfake videos

Security Affairs

Monika Bickert, Facebook for global policy management, announced that Facebook will ban deepfake videos and manipulated content. While these videos are still rare on the internet, they present a significant challenge for our industry and society as their use increases.”