Critical flaw affects Cisco Video Surveillance Manager

Security Affairs

Cisco has patched a critical vulnerability in the Cisco Video Surveillance Manager (VSM) could be exploited by an unauthenticated remote attacker to gain root access. The vulnerability impacts Cisco Video Surveillance Manager (VSM) Software releases 7.10, 7.11, and 7.11.1.

Video 74

Hackers Deface Popular Videos Published by Vevo

Data Breach Today

Pilfered Access Credentials Could Be to Blame A handful of popular music videos published on YouTube were defaced on Tuesday, with two hackers claiming credit.

Video 141

Video Interview: Know Your (Digital) Customer

Data Breach Today

IBM's Shaked Vax on Validating Digital Identities with Physical Identities to Protect Accounts In the wake of so many mega-breaches, new account fraud is easier to perpetrate than account takeovers.

Video 141

New Video Course for State Agencies

The Texas Record

We are pleased to announce a new online video course for state agency records management officers and records liaisons. Click here to access the video on the course page. We will be further developing our online courses to add video and interactive functionality, so stay tuned for more.

Video: How Automation and Machine Learning Power Future of SIEM

The Security Ledger

Interview RSA Security Conversations Video Black Hat conferences encryption privacy software trendsIn this interview with The Security Ledger, Amy Blackshaw of RSA talks about how the company’s Netwitness SIEM product is evolving to keep pace with a fast -evolving security market.

Video 52

Video: Bishop Fox on Device Threats and Layered Security

Threatpost

Black Hat Videos Black Hat USA IoT IoT security SecurityBishop Fox's Christie Terrill talks to us about IoT security and other trends at Black Hat 2018 this month.

Video 68

Fake Video Could End Viral Justice

WIRED Threat Level

Opinion: Videos provide transformative new avenues for justice, often summoning well-deserved Twitter mobs. Deep fakes could change all that. Security Opinion

Video 66

RSA Conference Preview: More Video Interviews in 2018

Data Breach Today

Leading the latest edition of the ISMG Security Report: A preview of our extensive coverage of the 2018 RSA Conference, which will include dozens of video interviews with thought leaders

Video 100

What’s NewCo? These Videos Will Help

John Battelle's Searchblog

These Videos Will Help appeared first on John Battelle's Search Blog. The NewCo festival model is counter-intuitive, so we made these videos to help explain what the fuss is all about. These Videos Will Help appeared first on John Battelle's Search Blog.

Video 88

Black Hat Exclusive Video: The IoT Security Threat Looms for Enterprises

Threatpost

Black Hat IoT Videos Armis DDoS attack DEF CON IoT securityArmis' CTO discusses the top IoT security issues in the marketplace today - and whether device manufacturers will start to prioritize security.

Video 75

Security Vulnerabilities in Star Wars

Data Breach Today

A fun video describing some of the many Empire security vulnerabilities in the first Star Wars movie. humor securityawareness video vulnerabilitiesHappy New Year, everyone.

Critical Vulnerability Found in Cisco Video Surveillance Manager

Threatpost

Cisco has patched vulnerability in its video surveillance manager software that could give an unauthenticated, remote attacker the ability to execute arbitrary commands on targeted systems. IoT Vulnerabilities Cisco critical patch surveillance manager vulnerability

Video 81

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Security Affairs

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber crime syndicates. video streams that are viewed). This user seems to at least have permissions to access/view video streams.”

Video 78

Black Hat Video Exclusive: Mobile APTs Redefining Phishing Attacks

Threatpost

Black Hat Government Malware Mobile Security apt Dark Caracal Lookout mike murray mobile apt mobile malware Phishing Stealth Mango video interviewMike Murray, vice president of security intelligence at Lookout, discusses how mobile is redefining phishing, taking it out of the traditional inbox and into SMS and Facebook messages.

Video 52

InfoGovCon 2016 Promo Video

JKevinParker

Check out the new promo video for InfoGovCon 2016 ! I'm excited to be one of the speakers for this exciting event. You should come! Learn more at: www.InfoGovCon.com. InfoGovCon

Video 52

Video as Grammar: The Supercut

John Battelle's Searchblog

As early as 2003, which was the first year I began writing this site, I wrote about the idea of “video as grammar.” ” By this I meant (and mean) that I foresaw a day when our culture communicated with itself using video much as we currently use text.

Video 82

The 140 Character Video Is Six Seconds Long

John Battelle's Searchblog

The post The 140 Character Video Is Six Seconds Long appeared first on John Battelle's Search Blog. Twitter announced its integration of Vine today , and to put not too fine a point on it, the service is, in essence, a way to create a video tweet.

Video 107

Friday Squid Blogging: Capturing the Giant Squid on Video

Schneier on Security

In this 2013 TED talk, oceanographer Edith Widder explains how her team captured the giant squid on video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

Video 59

[Video] Offsite Document Storage Facilities

Record Nations

The post [Video] Offsite Document Storage Facilities appeared first on Record Nations.

The Logan Paul "Suicide Forest" Video Should Be a Reckoning For YouTube

WIRED Threat Level

Logan Paul's video of Japan's "suicide forest" was a nadir for the YouTube star—and the platform that enables him. Security

Video 87

Information Governance vs Records Management [Video]

Record Nations

Video Transcript Recognizing the Difference The terms “records management” and “information governance” are often used interchangeably. The post Information Governance vs Records Management [Video] appeared first on Record Nations.

e-Records 2017: Video and Wrap Up

The Texas Record

To close out this year’s e-Records Conference coverage, here is a listing of all the session recaps and a video produced by TSLAC’s Communications team. Video: News eRecords eRecords 2017 Local Governments State Agencies TSLAC

Video 52

[Video] 2017 Records Retention: Requirements and Guidelines

Record Nations

Video Transcription Why Track Retention? The post [Video] 2017 Records Retention: Requirements and Guidelines appeared first on Record Nations.

Video 60

Records Storage: Pricing Out a Storage Project [Video]

Record Nations

In the video below, you can discover the factors that influence a records storage service and if it is a viable option for your business. Video Transcription Records Storage: Pricing […].

Video 68

Vancouver Elections: New Video Wall Show

Archives Blogs

With the 2018 civic election set for October 20, and advance polls October 10-17, we couldn’t pass up the opportunity to search through our holdings to see what election-related material would make an interesting and new video wall show.

Video 26

Food and Drink: New Video Wall Show

Archives Blogs

Over the past several years, five video wall shows centering on various themes have been created at the Archives. The video wall shows highlight the diverse nature of our photograph, video, and textual holdings. One of the photographs included in the video wall show.

Video 35

Data Backups: Types and Methods [Video]

Record Nations

The post Data Backups: Types and Methods [Video] appeared first on Record Nations. Data backup is an essential process to ensure business stability and security. Any data that isn’t backed up regularly risks being lost, stolen, or accidentally deleted.

Video 60

Security bug in Swann IoT Camera allowed to access video feeds

Security Affairs

Security experts have discovered a security glitch in Swann IoT camera that could be exploited by attackers to access video feeds. The affected camera model it a battery-powered HD camera that implements video streaming feature either directly over the local network or via a cloud service.

IoT 65

Facebook is designing its own chips to help filter live videos

Information Management Resources

More and more smartphones let users take advantage of speech recognition, augmented and virtual reality, as well as image and video processing directly on their devices. Hardware and software Artificial intelligence Facebook

Video 76

Script Kiddies, Criminals Hacking Video Streams for Fun & Profit

Dark Reading

Video streams are getting hijacked for 'prestige,' DDoS, and financial gain, a new report found

Video 43

CIPL President Bojana Bellamy Interviewed for Capgemini Video Series

Hunton Privacy

On January 23, 2018, multinational consulting firm Capgemini interviewed Bojana Bellamy , President of the Centre for Information Policy Leadership at Hunton & Williams, for their “Jane Meets” video series with the Chief Information Security Officer (“CISO”). Capgemini’s video series also focuses on cybersecurity and risk, with an emphasis on the need for a proactive approach to keep companies ahead of the increased number of cyber threats.

GDPR 44

Android Apps Are Sharing Screenshots, Video Recordings to Third Parties, Report Finds

Threatpost

Some mobile apps can take and share screenshots and video of the phones’ app activity without users’ knowledge. Mobile Security Privacy Android Android APKs Android app app app permissions google gopuff Mobile security test fairy

Video 62

Court Denies Plaintiff’s Request for Sanctions for Defendant’s Failure to Preserve Surveillance Video: eDiscovery Case Law

eDiscovery Daily

According to declarations, the surveillance footage was recorded on network video recorders that automatically delete old footage as the recorders become full. Should the defendant have preserved the video if it was used as evidence to terminate the plaintiff’s employment? In Ball v.

Video 39

Facebook apologises for storing draft videos users thought they had deleted

The Guardian Data Protection

Facebook says ‘bug’ resulted in videos being kept, while CEO Mark Zuckerberg hits back at Apple chief Tim Cook’s ‘extremely glib’ attack Facebook continues to deal with the fallout of the Cambridge Analytica files , announcing policy changes and bug fixes aimed at undoing some of the company’s more controversial data collection features.

FTC Approves Changes to Video Game Industry’s Safe Harbor Program Under COPPA

Hunton Privacy

On August 13, 2018, the Federal Trade Commission approved changes to the video game industry’s safe harbor guidelines under the Children’s Online Privacy Protection Act (“COPPA”) Rule. COPPA’s “safe harbor” provision enables industry groups to propose self-regulatory guidelines regarding COPPA compliance for FTC approval. . The Entertainment Software Ratings Board (“ESRB”)’s proposed modifications were opened to a comment and notice period between April and May of this year.

Video 43

The Web 2 Debrief Video

John Battelle's Searchblog

Here's the video Almost immediately after the Web 2.0 Summit last month, Tim O'Reilly and I sat down at an FM event and debriefed each other on what we learned.

Video 62

Data Breach Today - Untitled Article

Data Breach Today

You can’t skip video marketing on LinkedIn. The best example would be Gary Vaynerchuk’s videos on LinkedIn. Marketers like Gary fins more innovative ways to attract audiences, thus making a video as a meaningful part of the strategic conversation.

B2B 207

Are digital transformation efforts being undone by cat videos?

Information Management Resources

New technology can, in some circumstances, not lead to any increase in productivity and actually result in less employee engagement with their work, says Microsoft. Social media Data management Data types Data discovery

On Media, Ro Khanna, the NSA, and the Future of the Internet: Bloomberg Video

John Battelle's Searchblog

The post On Media, Ro Khanna, the NSA, and the Future of the Internet: Bloomberg Video appeared first on John Battelle's Search Blog. I had a chance to go on Bloomberg today and co-host with Cory and Emily, which was fun.

Video 103

Only 53 Australians used Facebook app in massive data breach – video

The Guardian Data Protection

Facebook has revealed that only 53 users in Australia installed the Facebook app This is Your Digital Life. But 311,127 Australians had their private data harvested. This means that for every person who took the personality quiz, almost 6,000 people had their private data accessed Continue reading.

Video 84

Friday Squid Blogging: Dissecting a Giant Squid

Schneier on Security

squid videoLessons learned. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

Blog 60

Matt Blaze on Securing Voting Machines

Schneier on Security

I have not watched the video. nationalsecuritypolicy securityengineering video votingMatt Blaze's House testimony on the security of voting machines is an excellent read. Details on the entire hearing is here.)

Ubiquitous Video: Why We Need a Robots.txt For the Real World

John Battelle's Searchblog

The post Ubiquitous Video: Why We Need a Robots.txt For the Real World appeared first on John Battelle's Search Blog. The post Ubiquitous Video: Why We Need a Robots.txt For the Real World appeared first on John Battelle's Search Blog.

Video 109