Senators Press Social Media Firms to Fight 'Deepfake' Videos

Data Breach Today

senators Mark Warner and Marco Rubio are urging social media firms to create policies and standards to combat the spread of "deepfake" videos, which they say pose a potential threat to American democracy Warner and Rubio Want Companies to Develop Standards and Policies to Combat Fakes U.S.


Computers and Video Surveillance

Schneier on Security

Maybe they just recorded, and no one looked at the video unless they needed to. In either case, the video was only stored for a few days because storage was expensive. Identification technologies make it easier to automatically figure out who is in the videos.

Video Surveillance by Computer

Schneier on Security

The ACLU's Jay Stanley has just published a fantastic report: " The Dawn of Robot Surveillance " (blog post here ) Basically, it lays out a future of ubiquitous video cameras watched by increasingly sophisticated video analytics software, and discusses the potential harms to society.

Streaming Video Fans Open to TV Hijacking


Cloud Security Hacks IoT Privacy Vulnerabilities data breach financial information infomir ministra roku streaming video subscriber data tv hijacking vulnerabilitiesCritical bugs impact a widely deployed streaming platform, common in the U.S. and elsewhere.

IoT 114

Face Off: Researchers Battle AI-Generated Deep Fake Videos

Data Breach Today

Critical flaw affects Cisco Video Surveillance Manager

Security Affairs

Cisco has patched a critical vulnerability in the Cisco Video Surveillance Manager (VSM) could be exploited by an unauthenticated remote attacker to gain root access. The vulnerability impacts Cisco Video Surveillance Manager (VSM) Software releases 7.10, 7.11, and 7.11.1.

Access 108

Detecting Fake Videos

Schneier on Security

This story nicely illustrates the arms race between technologies to create fake videos and technologies to detect fake videos: These fakes, while convincing if you watch a few seconds on a phone screen, aren't perfect (yet). academicpapers behavioraldetection fraud video

Paper 61

Hackers Deface Popular Videos Published by Vevo

Data Breach Today

Pilfered Access Credentials Could Be to Blame A handful of popular music videos published on YouTube were defaced on Tuesday, with two hackers claiming credit.

Access 141

Guardzilla Security Video System Footage exposed online

Security Affairs

A vulnerability in the Guardzilla home video surveillance system could be exploited by users to watch Guardzilla footage of other users. The Guardzilla All-In-One Video Security System is an indoor video surveillance solution.

Linkedin Learning: Producing a Video

Adam Shostack

They even “let” you edit your own videos. Like doing a video course so we could show me drawing on a whiteboard, rather than showing fancy pictures and implying that that’s what you need to create to threat model like the instructor.

IT 83

Friday Squid Blogging: New Giant Squid Video

Schneier on Security

This is a fantastic video of a young giant squid named Heck swimming around Toyama Bay near Tokyo. squid videoAs usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

Cartoon Network Hacked Worldwide to Show Brazilian Stripper Videos


Ricardo Milos joined Ben 10, Adventure Time and We Bare Bear videos on its websites over the weekend. Hacks Web Security arabic memes brazilian hackers cartoon network Defacement Hacked ricardo milos stripper videos Websites

IT 88

For $8.6M, Cisco Settles Suit Over Bug-Riddled Video Surveillance Software


million Cisco court documents Cybersecurity false claims Federal government james glenn knowingly sold Lawsuit security vulnerability Settlement states video surveillance manager whistleblower

IoT 113

Insecure Real-Time Video Protocols Allow Hollywood-Style Hacking

Dark Reading

Lack of security in the default settings of Internet-enabled video cameras make co-opting video feeds not just a movie-hacker technique, but a reality for millions of cameras

VSDC video editing software website hacked again

Security Affairs

VSDC is a popular, free video editing and converting app and its website has over 1.3 “Doctor Web researchers discovered that the official website of a well-known video editing software, VSDC, was compromised.”

Video Interview: Know Your (Digital) Customer

Data Breach Today

IBM's Shaked Vax on Validating Digital Identities with Physical Identities to Protect Accounts In the wake of so many mega-breaches, new account fraud is easier to perpetrate than account takeovers.

Video: HackerOne CEO on the Evolving Bug Bounty Landscape


Hacks Videos Vulnerabilities bug bounty EU bug bounty HackerOne IoT Open SourceThreatpost talks to HackerOne CEO Marten Mickos on the EU's funding of open source bug bounty programs, how a company can start a program, and the next generation of bounty hunters.

IoT 103

[Video] Offsite Document Storage Facilities

Record Nations

The post [Video] Offsite Document Storage Facilities appeared first on Record Nations.

IT 87

Retro video game website Emuparadise suffered a data breach

Security Affairs

Retro video game website Emuparadise revealed to have suffered a data breach that exposed 1.1 Emuparadise is a website that offers tons of roms, isos and retro video games, users can download and play them with an emulator or play them with the web browser.

Video: Don’t be a Security Zombie!


From clicking on phishing emails to leaving personal information unsecured, the video explores the variety of dangers a lack of security awareness can pose. The post Video: Don’t be a Security Zombie!

Friday Squid Blogging: How Scientists Captured the Giant Squid Video

Schneier on Security

In June, I blogged about a video of a live juvenile giant squid. Here's how that video was captured. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

Fake Video Could End Viral Justice

WIRED Threat Level

Opinion: Videos provide transformative new avenues for justice, often summoning well-deserved Twitter mobs. Deep fakes could change all that. Security Opinion

Threat Modeling in 2018 (video release)

Adam Shostack

Blackhat has released all the 2018 US conference videos. My threat modeling in 2018 video is, of course, amongst them. Slides are linked here. threat modeling


Android devices could be hacked by playing a video due to CVE-2019-2107 flaw

Security Affairs

Playing a video on Android devices could be a dangerous operation due to a critical CVE-2019-2107 RCE flaw in Android OS between version 7.0 The PoC code, an HEVC encoded video, could allow an attacker to crash the media player. Watch out!

Video: Bishop Fox on Device Threats and Layered Security


Black Hat Videos Black Hat USA IoT IoT security SecurityBishop Fox's Christie Terrill talks to us about IoT security and other trends at Black Hat 2018 this month.

Videos and Links from the Public-Interest Technology Track at the RSA Conference

Schneier on Security

Video here ). If you missed it live, we have videos: How Public Interest Technologists are Changing the World : Matt Mitchell, Tactical Tech; Bruce Schneier, Fellow and Lecturer, Harvard Kennedy School; and J. Video here.) Video here.). Video here.). Video here.).

New Video Wall: Seasons

Archives Blogs

As summer turns over into autumn, we present a new video wall show in keeping with this theme: Seasons: Vancouver through the year. The video wall shows can be viewed in the Archives’ gallery space, or in the City Hall rotunda across from the elevators.

Flaws allow hacking a system playing untrusted videos on VLC Player

Security Affairs

Two vulnerabilities in VLC media player could allow remote attackers to take full control over a computer system while playing untrusted videos. It is quite easy for hackers to spread malicious video files on torrent sites, mimicking as a pirated copy of movie or TV series.

Risk 113

What’s NewCo? These Videos Will Help

John Battelle's Searchblog

These Videos Will Help appeared first on John Battelle's Search Blog. The NewCo festival model is counter-intuitive, so we made these videos to help explain what the fuss is all about. These Videos Will Help appeared first on John Battelle's Search Blog.


Friday Squid Blogging: Piglet Squid Video

Schneier on Security

Really neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

RSA Conference Preview: More Video Interviews in 2018

Data Breach Today

Leading the latest edition of the ISMG Security Report: A preview of our extensive coverage of the 2018 RSA Conference, which will include dozens of video interviews with thought leaders

Flaw in Zoom video conferencing software lets sites take over webcam on Mac

Security Affairs

Zoom video conferencing software for Mac is affected by a flaw that could allow attackers to take over webcams when users visit a website. “Enabling “Participants: On” when setting up a meeting, I discovered that anyone joining my meeting automatically had their video connected.

Preserved 91-minute video sufficient to capture ‘horrific storm’


The post Preserved 91-minute video sufficient to capture ‘horrific storm’ appeared first on Zapproved. Case Law adverse inference jury instruction ediscovery ESI preservation Proportional Sanctions Spoliation


EDPB Adopts Guidelines on Data Processing Through Video Devices

Hunton Privacy

The European Data Protection Board (the “EDPB”) recently adopted its Guidelines 3/2019 on processing of personal data through video devices (the “Guidelines”). Although the Guidelines provide examples of data processing for video surveillance, these examples are not exhaustive. The Guidelines aim to provide guidance on how to apply the EU General Data Protection Regulation (“GDPR”) in all potential areas of video device use.


Black Hat Exclusive Video: The IoT Security Threat Looms for Enterprises


Black Hat IoT Videos Armis DDoS attack DEF CON IoT securityArmis' CTO discusses the top IoT security issues in the marketplace today - and whether device manufacturers will start to prioritize security.

IoT 101

IoT Bug Grants Access to Home Video Surveillance

Dark Reading

Due to a shared Amazon S3 credential, all users of a certain model of the Guardzilla All-In-One Video Security System can view each other's videos

Black Hat Video Exclusive: Mobile APTs Redefining Phishing Attacks


Black Hat Government Malware Mobile Security apt Dark Caracal Lookout mike murray mobile apt mobile malware Phishing Stealth Mango video interviewMike Murray, vice president of security intelligence at Lookout, discusses how mobile is redefining phishing, taking it out of the traditional inbox and into SMS and Facebook messages.