Detecting Fake Videos

Schneier on Security

This story nicely illustrates the arms race between technologies to create fake videos and technologies to detect fake videos: These fakes, while convincing if you watch a few seconds on a phone screen, aren't perfect (yet). academicpapers behavioraldetection fraud video

Video 64

Face Off: Researchers Battle AI-Generated Deep Fake Videos

Data Breach Today

Video 183

Critical flaw affects Cisco Video Surveillance Manager

Security Affairs

Cisco has patched a critical vulnerability in the Cisco Video Surveillance Manager (VSM) could be exploited by an unauthenticated remote attacker to gain root access. The vulnerability impacts Cisco Video Surveillance Manager (VSM) Software releases 7.10, 7.11, and 7.11.1.

Video 91

Friday Squid Blogging: New Giant Squid Video

Schneier on Security

This is a fantastic video of a young giant squid named Heck swimming around Toyama Bay near Tokyo. squid videoAs usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

Video 61

Guardzilla Security Video System Footage exposed online

Security Affairs

A vulnerability in the Guardzilla home video surveillance system could be exploited by users to watch Guardzilla footage of other users. The Guardzilla All-In-One Video Security System is an indoor video surveillance solution.

Video 100

Hackers Deface Popular Videos Published by Vevo

Data Breach Today

Pilfered Access Credentials Could Be to Blame A handful of popular music videos published on YouTube were defaced on Tuesday, with two hackers claiming credit.

Video 137

Video Interview: Know Your (Digital) Customer

Data Breach Today

IBM's Shaked Vax on Validating Digital Identities with Physical Identities to Protect Accounts In the wake of so many mega-breaches, new account fraud is easier to perpetrate than account takeovers.

Video 137

Threat Modeling in 2018 (video release)

Adam Shostack

Blackhat has released all the 2018 US conference videos. My threat modeling in 2018 video is, of course, amongst them. Slides are linked here. threat modeling

Video 65

Fake Video Could End Viral Justice

WIRED Threat Level

Opinion: Videos provide transformative new avenues for justice, often summoning well-deserved Twitter mobs. Deep fakes could change all that. Security Opinion

Video 65

RSA Conference Preview: More Video Interviews in 2018

Data Breach Today

Leading the latest edition of the ISMG Security Report: A preview of our extensive coverage of the 2018 RSA Conference, which will include dozens of video interviews with thought leaders

Video 100

What’s NewCo? These Videos Will Help

John Battelle's Searchblog

These Videos Will Help appeared first on John Battelle's Search Blog. The NewCo festival model is counter-intuitive, so we made these videos to help explain what the fuss is all about. These Videos Will Help appeared first on John Battelle's Search Blog.

Video 87

IoT Bug Grants Access to Home Video Surveillance

Dark Reading

Due to a shared Amazon S3 credential, all users of a certain model of the Guardzilla All-In-One Video Security System can view each other's videos

Video 72

Video: How Automation and Machine Learning Power Future of SIEM

The Security Ledger

Interview RSA Security Conversations Video Black Hat conferences encryption privacy software trendsIn this interview with The Security Ledger, Amy Blackshaw of RSA talks about how the company’s Netwitness SIEM product is evolving to keep pace with a fast -evolving security market.

Video 52

[Video] Offsite Document Storage Facilities

Record Nations

The post [Video] Offsite Document Storage Facilities appeared first on Record Nations.

Video 56

Video: Bishop Fox on Device Threats and Layered Security

Threatpost

Black Hat Videos Black Hat USA IoT IoT security SecurityBishop Fox's Christie Terrill talks to us about IoT security and other trends at Black Hat 2018 this month.

Video 67

Amber Authenticate Protects Video Footage From Deepfakes and Tampering

WIRED Threat Level

Many of the body cameras worn by police are woefully vulnerable to hacking and manipulation. Amber Authenticate wants to fix that—with the blockchain. Security

Information Governance vs Records Management [Video]

Record Nations

Video Transcript Recognizing the Difference The terms “records management” and “information governance” are often used interchangeably. The post Information Governance vs Records Management [Video] appeared first on Record Nations.

Security Vulnerabilities in Star Wars

Data Breach Today

A fun video describing some of the many Empire security vulnerabilities in the first Star Wars movie. humor securityawareness video vulnerabilitiesHappy New Year, everyone.

Hackers can compromise your WhatsApp account by tricking you into answering a video call

Security Affairs

Hackers can compromise your WhatsApp account by tricking you into answering a video call, the company fixed the flaw in September. Memory corruption bug in WhatsApp's non-WebRTC video conferencing implementation [link].

Video 103

New Video Course for State Agencies

The Texas Record

We are pleased to announce a new online video course for state agency records management officers and records liaisons. Click here to access the video on the course page. We will be further developing our online courses to add video and interactive functionality, so stay tuned for more.

InfoGovCon 2016 Promo Video

JKevinParker

Check out the new promo video for InfoGovCon 2016 ! I'm excited to be one of the speakers for this exciting event. You should come! Learn more at: www.InfoGovCon.com. InfoGovCon

Video 52

[Video] 2017 Records Retention: Requirements and Guidelines

Record Nations

Video Transcription Why Track Retention? The post [Video] 2017 Records Retention: Requirements and Guidelines appeared first on Record Nations.

Video 60

Black Hat Exclusive Video: The IoT Security Threat Looms for Enterprises

Threatpost

Black Hat IoT Videos Armis DDoS attack DEF CON IoT securityArmis' CTO discusses the top IoT security issues in the marketplace today - and whether device manufacturers will start to prioritize security.

Video 74

How to deliver malware using weaponized Microsoft Office docs embedding YouTube video

Security Affairs

Researchers at Cymulate security firm devised a new stealthy technique to deliver malware leveraging videos embedded into weaponized Microsoft Office Documents. The technique could be used to execute JavaScript code when a user clicks on a weaponized YouTube video thumbnail embedded in a Weaponized Office document. “Cymulate’s research team has discovered a way to abuse the Online Video feature on Microsoft Word to execute malicious code.

Video 87

Records Storage: Pricing Out a Storage Project [Video]

Record Nations

In the video below, you can discover the factors that influence a records storage service and if it is a viable option for your business. Video Transcription Records Storage: Pricing […].

Video 68

The 140 Character Video Is Six Seconds Long

John Battelle's Searchblog

The post The 140 Character Video Is Six Seconds Long appeared first on John Battelle's Search Blog. Twitter announced its integration of Vine today , and to put not too fine a point on it, the service is, in essence, a way to create a video tweet.

Video 107

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Security Affairs

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber crime syndicates. video streams that are viewed). This user seems to at least have permissions to access/view video streams.”

Video 97

Video as Grammar: The Supercut

John Battelle's Searchblog

As early as 2003, which was the first year I began writing this site, I wrote about the idea of “video as grammar.” ” By this I meant (and mean) that I foresaw a day when our culture communicated with itself using video much as we currently use text.

Video 78

No Bad Faith Means No Sanctions for Failing to Preserve Video of Altercation: eDiscovery Case Law

eDiscovery Daily

O’Hara denied the plaintiff’s motion for sanctions based on the defendant’s alleged spoliation of a surveillance video that shows an altercation between the plaintiff and her supervisor, stating that “plaintiff has failed to meet the requirements of Fed. In Stovall v. Brykan Legends, LLC, No.

Friday Squid Blogging: Capturing the Giant Squid on Video

Schneier on Security

In this 2013 TED talk, oceanographer Edith Widder explains how her team captured the giant squid on video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

Video 68

Critical Vulnerability Found in Cisco Video Surveillance Manager

Threatpost

Cisco has patched vulnerability in its video surveillance manager software that could give an unauthenticated, remote attacker the ability to execute arbitrary commands on targeted systems. IoT Vulnerabilities Cisco critical patch surveillance manager vulnerability

Video 80

Black Hat Video Exclusive: Mobile APTs Redefining Phishing Attacks

Threatpost

Black Hat Government Malware Mobile Security apt Dark Caracal Lookout mike murray mobile apt mobile malware Phishing Stealth Mango video interviewMike Murray, vice president of security intelligence at Lookout, discusses how mobile is redefining phishing, taking it out of the traditional inbox and into SMS and Facebook messages.

Video 51

Data Backups: Types and Methods [Video]

Record Nations

The post Data Backups: Types and Methods [Video] appeared first on Record Nations. Data backup is an essential process to ensure business stability and security. Any data that isn’t backed up regularly risks being lost, stolen, or accidentally deleted.

Video 60

The Logan Paul "Suicide Forest" Video Should Be a Reckoning For YouTube

WIRED Threat Level

Logan Paul's video of Japan's "suicide forest" was a nadir for the YouTube star—and the platform that enables him. Security

Video 87

U.S. Court Allows Video Deposition Over EU Deponent’s Privacy Objections

HL Chronicle of Data Protection

litigant’s right to obtain discovery, including video-taped depositions. Still, to “ease [the deponent’s] privacy concerns,” the judge ordered that the video component of the deposition not be publicly disclosed or otherwise released outside of the current litigation. A U.S.

Video 52

Security Bugs in Video Chat Tools Enable Remote Attackers

Dark Reading

Lifesize is issuing a hotfix to address vulnerabilities in its enterprise collaboration devices, which could give hackers a gateway into target organizations

Video 60

On Disguise

Schneier on Security

The former CIA Chief of Disguise has a fascinating video about her work. cia disguise espionage video

Video 91

My MEDIUM Article: Deepfakes and Deep Video Portraits?—?What are they and what is the difference?

Architect Security

Check out my latest article on MEDIUM: Deepfakes and Deep Video Portraits?—?What What are they and what is the difference? link]. Media MEDIUM Articles Privacy Social Media Tech

Food and Drink: New Video Wall Show

Archives Blogs

Over the past several years, five video wall shows centering on various themes have been created at the Archives. The video wall shows highlight the diverse nature of our photograph, video, and textual holdings. One of the photographs included in the video wall show.

Video 35

Security bug in Swann IoT Camera allowed to access video feeds

Security Affairs

Security experts have discovered a security glitch in Swann IoT camera that could be exploited by attackers to access video feeds. The affected camera model it a battery-powered HD camera that implements video streaming feature either directly over the local network or via a cloud service.

IoT 69