VLC Media Player Allows Desktop Takeover Via Malicious Video Files

Threatpost

Malware Vulnerabilities desktop takeover malicious video file MKV Open Source tracker Torrent videolan VLC player vulnerabilityVideoLAN has released an updated version of its VLC Player to fix over a dozen bugs.

Video 88

Computers and Video Surveillance

Schneier on Security

Maybe they just recorded, and no one looked at the video unless they needed to. In either case, the video was only stored for a few days because storage was expensive. Identification technologies make it easier to automatically figure out who is in the videos.

Video 87

Video Surveillance by Computer

Schneier on Security

The ACLU's Jay Stanley has just published a fantastic report: " The Dawn of Robot Surveillance " (blog post here ) Basically, it lays out a future of ubiquitous video cameras watched by increasingly sophisticated video analytics software, and discusses the potential harms to society.

Video 67

Face Off: Researchers Battle AI-Generated Deep Fake Videos

Data Breach Today

Video 208

Streaming Video Fans Open to TV Hijacking

Threatpost

Cloud Security Hacks IoT Privacy Vulnerabilities data breach financial information infomir ministra roku streaming video subscriber data tv hijacking vulnerabilitiesCritical bugs impact a widely deployed streaming platform, common in the U.S. and elsewhere.

Video 93

Detecting Fake Videos

Schneier on Security

This story nicely illustrates the arms race between technologies to create fake videos and technologies to detect fake videos: These fakes, while convincing if you watch a few seconds on a phone screen, aren't perfect (yet). academicpapers behavioraldetection fraud video

Video 56

Hackers Deface Popular Videos Published by Vevo

Data Breach Today

Pilfered Access Credentials Could Be to Blame A handful of popular music videos published on YouTube were defaced on Tuesday, with two hackers claiming credit.

Video 139

Linkedin Learning: Producing a Video

Adam Shostack

They even “let” you edit your own videos. Like doing a video course so we could show me drawing on a whiteboard, rather than showing fancy pictures and implying that that’s what you need to create to threat model like the instructor.

Video 83

Cartoon Network Hacked Worldwide to Show Brazilian Stripper Videos

Threatpost

Ricardo Milos joined Ben 10, Adventure Time and We Bare Bear videos on its websites over the weekend. Hacks Web Security arabic memes brazilian hackers cartoon network Defacement Hacked ricardo milos stripper videos Websites

Video 87

Guardzilla Security Video System Footage exposed online

Security Affairs

A vulnerability in the Guardzilla home video surveillance system could be exploited by users to watch Guardzilla footage of other users. The Guardzilla All-In-One Video Security System is an indoor video surveillance solution.

Video 100

Android devices could be hacked by playing a video due to CVE-2019-2107 flaw

Security Affairs

Playing a video on Android devices could be a dangerous operation due to a critical CVE-2019-2107 RCE flaw in Android OS between version 7.0 The PoC code, an HEVC encoded video, could allow an attacker to crash the media player. Watch out!

Video 114

Friday Squid Blogging: New Giant Squid Video

Schneier on Security

This is a fantastic video of a young giant squid named Heck swimming around Toyama Bay near Tokyo. squid videoAs usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

Video 55

Insecure Real-Time Video Protocols Allow Hollywood-Style Hacking

Dark Reading

Lack of security in the default settings of Internet-enabled video cameras make co-opting video feeds not just a movie-hacker technique, but a reality for millions of cameras

Video 90

Video Interview: Know Your (Digital) Customer

Data Breach Today

IBM's Shaked Vax on Validating Digital Identities with Physical Identities to Protect Accounts In the wake of so many mega-breaches, new account fraud is easier to perpetrate than account takeovers.

Video 139

[Video] Offsite Document Storage Facilities

Record Nations

The post [Video] Offsite Document Storage Facilities appeared first on Record Nations.

Video 87

For $8.6M, Cisco Settles Suit Over Bug-Riddled Video Surveillance Software

Threatpost

million Cisco court documents Cybersecurity false claims Federal government james glenn knowingly sold Lawsuit security vulnerability Settlement states video surveillance manager whistleblower

Video 80

Video: Don’t be a Security Zombie!

MediaPro

From clicking on phishing emails to leaving personal information unsecured, the video explores the variety of dangers a lack of security awareness can pose. The post Video: Don’t be a Security Zombie!

Video 70

Threat Modeling in 2018 (video release)

Adam Shostack

Blackhat has released all the 2018 US conference videos. My threat modeling in 2018 video is, of course, amongst them. Slides are linked here. threat modeling

Video 65

Friday Squid Blogging: Piglet Squid Video

Schneier on Security

Really neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

Video 55

EDPB Adopts Guidelines on Data Processing Through Video Devices

Hunton Privacy

The European Data Protection Board (the “EDPB”) recently adopted its Guidelines 3/2019 on processing of personal data through video devices (the “Guidelines”). Although the Guidelines provide examples of data processing for video surveillance, these examples are not exhaustive. The Guidelines aim to provide guidance on how to apply the EU General Data Protection Regulation (“GDPR”) in all potential areas of video device use.

Video 52

VSDC video editing software website hacked again

Security Affairs

VSDC is a popular, free video editing and converting app and its website has over 1.3 “Doctor Web researchers discovered that the official website of a well-known video editing software, VSDC, was compromised.”

Video 68

Retro video game website Emuparadise suffered a data breach

Security Affairs

Retro video game website Emuparadise revealed to have suffered a data breach that exposed 1.1 Emuparadise is a website that offers tons of roms, isos and retro video games, users can download and play them with an emulator or play them with the web browser.

Videos and Links from the Public-Interest Technology Track at the RSA Conference

Schneier on Security

Video here ). If you missed it live, we have videos: How Public Interest Technologists are Changing the World : Matt Mitchell, Tactical Tech; Bruce Schneier, Fellow and Lecturer, Harvard Kennedy School; and J. Video here.) Video here.). Video here.). Video here.).

Video 60

What’s NewCo? These Videos Will Help

John Battelle's Searchblog

These Videos Will Help appeared first on John Battelle's Search Blog. The NewCo festival model is counter-intuitive, so we made these videos to help explain what the fuss is all about. These Videos Will Help appeared first on John Battelle's Search Blog.

Video 86

RSA Conference Preview: More Video Interviews in 2018

Data Breach Today

Leading the latest edition of the ISMG Security Report: A preview of our extensive coverage of the 2018 RSA Conference, which will include dozens of video interviews with thought leaders

Video 100

Video: HackerOne CEO on the Evolving Bug Bounty Landscape

Threatpost

Hacks Videos Vulnerabilities bug bounty EU bug bounty HackerOne IoT Open SourceThreatpost talks to HackerOne CEO Marten Mickos on the EU's funding of open source bug bounty programs, how a company can start a program, and the next generation of bounty hunters.

Video 66

Flaws allow hacking a system playing untrusted videos on VLC Player

Security Affairs

Two vulnerabilities in VLC media player could allow remote attackers to take full control over a computer system while playing untrusted videos. It is quite easy for hackers to spread malicious video files on torrent sites, mimicking as a pirated copy of movie or TV series.

Video 92

Fake Video Could End Viral Justice

WIRED Threat Level

Opinion: Videos provide transformative new avenues for justice, often summoning well-deserved Twitter mobs. Deep fakes could change all that. Security Opinion

Video 63

Video: Bishop Fox on Device Threats and Layered Security

Threatpost

Black Hat Videos Black Hat USA IoT IoT security SecurityBishop Fox's Christie Terrill talks to us about IoT security and other trends at Black Hat 2018 this month.

Video 69

Friday Squid Blogging: Fantastic Video of a Juvenile Giant Squid

Schneier on Security

It's amazing : Then, about 20 hours into the recording from the Medusa's fifth deployment, Dr. Robinson saw the sharp points of tentacles sneaking into the camera's view. "My My heart felt like exploding," he said on Thursday, over a shaky phone connection from the ship's bridge.

Video 70

Video: How Automation and Machine Learning Power Future of SIEM

The Security Ledger

Interview RSA Security Conversations Video Black Hat conferences encryption privacy software trendsIn this interview with The Security Ledger, Amy Blackshaw of RSA talks about how the company’s Netwitness SIEM product is evolving to keep pace with a fast -evolving security market.

Video 52

Information Governance vs Records Management [Video]

Record Nations

Video Transcript Recognizing the Difference The terms “records management” and “information governance” are often used interchangeably. The post Information Governance vs Records Management [Video] appeared first on Record Nations.

Flaw in Zoom video conferencing software lets sites take over webcam on Mac

Security Affairs

Zoom video conferencing software for Mac is affected by a flaw that could allow attackers to take over webcams when users visit a website. “Enabling “Participants: On” when setting up a meeting, I discovered that anyone joining my meeting automatically had their video connected.

Video 78

InfoGovCon 2016 Promo Video

JKevinParker

Check out the new promo video for InfoGovCon 2016 ! I'm excited to be one of the speakers for this exciting event. You should come! Learn more at: www.InfoGovCon.com. InfoGovCon

Video 52

IoT Bug Grants Access to Home Video Surveillance

Dark Reading

Due to a shared Amazon S3 credential, all users of a certain model of the Guardzilla All-In-One Video Security System can view each other's videos

Video 73

[Video] 2017 Records Retention: Requirements and Guidelines

Record Nations

Video Transcription Why Track Retention? The post [Video] 2017 Records Retention: Requirements and Guidelines appeared first on Record Nations.

Video 60

New Video Course for State Agencies

The Texas Record

We are pleased to announce a new online video course for state agency records management officers and records liaisons. Click here to access the video on the course page. We will be further developing our online courses to add video and interactive functionality, so stay tuned for more.

Security Vulnerabilities in Star Wars

Data Breach Today

A fun video describing some of the many Empire security vulnerabilities in the first Star Wars movie. humor securityawareness video vulnerabilitiesHappy New Year, everyone.

Video as Grammar: The Supercut

John Battelle's Searchblog

As early as 2003, which was the first year I began writing this site, I wrote about the idea of “video as grammar.” ” By this I meant (and mean) that I foresaw a day when our culture communicated with itself using video much as we currently use text.

Video 79

The 140 Character Video Is Six Seconds Long

John Battelle's Searchblog

The post The 140 Character Video Is Six Seconds Long appeared first on John Battelle's Search Blog. Twitter announced its integration of Vine today , and to put not too fine a point on it, the service is, in essence, a way to create a video tweet.

Video 106