Video Surveillance by Computer

Schneier on Security

The ACLU's Jay Stanley has just published a fantastic report: " The Dawn of Robot Surveillance " (blog post here ) Basically, it lays out a future of ubiquitous video cameras watched by increasingly sophisticated video analytics software, and discusses the potential harms to society.

Computers and Video Surveillance

Schneier on Security

Maybe they just recorded, and no one looked at the video unless they needed to. In either case, the video was only stored for a few days because storage was expensive. Identification technologies make it easier to automatically figure out who is in the videos.

Detecting Fake Videos

Schneier on Security

This story nicely illustrates the arms race between technologies to create fake videos and technologies to detect fake videos: These fakes, while convincing if you watch a few seconds on a phone screen, aren't perfect (yet). academicpapers behavioraldetection fraud video

Paper 103

Senators Press Social Media Firms to Fight 'Deepfake' Videos

Data Breach Today

senators Mark Warner and Marco Rubio are urging social media firms to create policies and standards to combat the spread of "deepfake" videos, which they say pose a potential threat to American democracy Warner and Rubio Want Companies to Develop Standards and Policies to Combat Fakes U.S.


Friday Squid Blogging: New Giant Squid Video

Schneier on Security

This is a fantastic video of a young giant squid named Heck swimming around Toyama Bay near Tokyo. squid videoAs usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

Face Off: Researchers Battle AI-Generated Deep Fake Videos

Data Breach Today

Critical flaw affects Cisco Video Surveillance Manager

Security Affairs

Cisco has patched a critical vulnerability in the Cisco Video Surveillance Manager (VSM) could be exploited by an unauthenticated remote attacker to gain root access. The vulnerability impacts Cisco Video Surveillance Manager (VSM) Software releases 7.10, 7.11, and 7.11.1.

Access 108

Capturing customer attention with video

OpenText Information Management

Consumers now spend over 3 hours per day on … The post Capturing customer attention with video appeared first on OpenText Blogs. Customers today have a lot of choices and are exposed to over 5,000 brand and advertising impressions a day.

WhatsApp Remote Code Execution Triggered by Videos


Mobile Security Vulnerabilities Web Security Buffer Overflow CVE-2019-11931 Data Privacy Denial of Service Facebook flaw mp4 remote code execution Security videos WhatsApp WhatsApp flawThe flaw can be trivially exploited.

VLC Media Player Allows Desktop Takeover Via Malicious Video Files


Malware Vulnerabilities desktop takeover malicious video file MKV Open Source tracker Torrent videolan VLC player vulnerabilityVideoLAN has released an updated version of its VLC Player to fix over a dozen bugs.

IT 114

Friday Squid Blogging: How Scientists Captured the Giant Squid Video

Schneier on Security

In June, I blogged about a video of a live juvenile giant squid. Here's how that video was captured. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

Hackers Deface Popular Videos Published by Vevo

Data Breach Today

Pilfered Access Credentials Could Be to Blame A handful of popular music videos published on YouTube were defaced on Tuesday, with two hackers claiming credit.

Access 141

Guardzilla Security Video System Footage exposed online

Security Affairs

A vulnerability in the Guardzilla home video surveillance system could be exploited by users to watch Guardzilla footage of other users. The Guardzilla All-In-One Video Security System is an indoor video surveillance solution.

Linkedin Learning: Producing a Video

Adam Shostack

They even “let” you edit your own videos. Like doing a video course so we could show me drawing on a whiteboard, rather than showing fancy pictures and implying that that’s what you need to create to threat model like the instructor.

IT 83

Videos and Links from the Public-Interest Technology Track at the RSA Conference

Schneier on Security

Video here ). If you missed it live, we have videos: How Public Interest Technologists are Changing the World : Matt Mitchell, Tactical Tech; Bruce Schneier, Fellow and Lecturer, Harvard Kennedy School; and J. Video here.) Video here.). Video here.). Video here.).

Friday Squid Blogging: Piglet Squid Video

Schneier on Security

Really neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

Video Interview: Know Your (Digital) Customer

Data Breach Today

IBM's Shaked Vax on Validating Digital Identities with Physical Identities to Protect Accounts In the wake of so many mega-breaches, new account fraud is easier to perpetrate than account takeovers.

VSDC video editing software website hacked again

Security Affairs

VSDC is a popular, free video editing and converting app and its website has over 1.3 “Doctor Web researchers discovered that the official website of a well-known video editing software, VSDC, was compromised.”

[Video] Offsite Document Storage Facilities

Record Nations

The post [Video] Offsite Document Storage Facilities appeared first on Record Nations.

IT 87

Cartoon Network Hacked Worldwide to Show Brazilian Stripper Videos


Ricardo Milos joined Ben 10, Adventure Time and We Bare Bear videos on its websites over the weekend. Hacks Web Security arabic memes brazilian hackers cartoon network Defacement Hacked ricardo milos stripper videos Websites

IT 88

Insecure Real-Time Video Protocols Allow Hollywood-Style Hacking

Dark Reading

Lack of security in the default settings of Internet-enabled video cameras make co-opting video feeds not just a movie-hacker technique, but a reality for millions of cameras

For $8.6M, Cisco Settles Suit Over Bug-Riddled Video Surveillance Software


million Cisco court documents Cybersecurity false claims Federal government james glenn knowingly sold Lawsuit security vulnerability Settlement states video surveillance manager whistleblower

IoT 113

Video: HackerOne CEO on the Evolving Bug Bounty Landscape


Hacks Videos Vulnerabilities bug bounty EU bug bounty HackerOne IoT Open SourceThreatpost talks to HackerOne CEO Marten Mickos on the EU's funding of open source bug bounty programs, how a company can start a program, and the next generation of bounty hunters.

IoT 103

Retro video game website Emuparadise suffered a data breach

Security Affairs

Retro video game website Emuparadise revealed to have suffered a data breach that exposed 1.1 Emuparadise is a website that offers tons of roms, isos and retro video games, users can download and play them with an emulator or play them with the web browser.

Fake Video Could End Viral Justice

WIRED Threat Level

Opinion: Videos provide transformative new avenues for justice, often summoning well-deserved Twitter mobs. Deep fakes could change all that. Security Opinion

Video: Don’t be a Security Zombie!


From clicking on phishing emails to leaving personal information unsecured, the video explores the variety of dangers a lack of security awareness can pose. The post Video: Don’t be a Security Zombie!

Threat Modeling in 2018 (video release)

Adam Shostack

Blackhat has released all the 2018 US conference videos. My threat modeling in 2018 video is, of course, amongst them. Slides are linked here. threat modeling


Video: Bishop Fox on Device Threats and Layered Security


Black Hat Videos Black Hat USA IoT IoT security SecurityBishop Fox's Christie Terrill talks to us about IoT security and other trends at Black Hat 2018 this month.

Friday Squid Blogging: Fantastic Video of a Juvenile Giant Squid

Schneier on Security

It's amazing : Then, about 20 hours into the recording from the Medusa's fifth deployment, Dr. Robinson saw the sharp points of tentacles sneaking into the camera's view. "My My heart felt like exploding," he said on Thursday, over a shaky phone connection from the ship's bridge.

IT 112

Android devices could be hacked by playing a video due to CVE-2019-2107 flaw

Security Affairs

Playing a video on Android devices could be a dangerous operation due to a critical CVE-2019-2107 RCE flaw in Android OS between version 7.0 The PoC code, an HEVC encoded video, could allow an attacker to crash the media player. Watch out!

Facebook Discloses WhatsApp MP4 Video Vulnerability

Dark Reading

A stack-based buffer overflow bug can be exploited by sending a specially crafted video file to a WhatsApp user


What’s NewCo? These Videos Will Help

John Battelle's Searchblog

These Videos Will Help appeared first on John Battelle's Search Blog. The NewCo festival model is counter-intuitive, so we made these videos to help explain what the fuss is all about. These Videos Will Help appeared first on John Battelle's Search Blog.


Flaws allow hacking a system playing untrusted videos on VLC Player

Security Affairs

Two vulnerabilities in VLC media player could allow remote attackers to take full control over a computer system while playing untrusted videos. It is quite easy for hackers to spread malicious video files on torrent sites, mimicking as a pirated copy of movie or TV series.

Risk 113

RSA Conference Preview: More Video Interviews in 2018

Data Breach Today

Leading the latest edition of the ISMG Security Report: A preview of our extensive coverage of the 2018 RSA Conference, which will include dozens of video interviews with thought leaders

New Video Wall: Seasons

Archives Blogs

As summer turns over into autumn, we present a new video wall show in keeping with this theme: Seasons: Vancouver through the year. The video wall shows can be viewed in the Archives’ gallery space, or in the City Hall rotunda across from the elevators.

Flaw in Zoom video conferencing software lets sites take over webcam on Mac

Security Affairs

Zoom video conferencing software for Mac is affected by a flaw that could allow attackers to take over webcams when users visit a website. “Enabling “Participants: On” when setting up a meeting, I discovered that anyone joining my meeting automatically had their video connected.

Black Hat Exclusive Video: The IoT Security Threat Looms for Enterprises


Black Hat IoT Videos Armis DDoS attack DEF CON IoT securityArmis' CTO discusses the top IoT security issues in the marketplace today - and whether device manufacturers will start to prioritize security.

IoT Bug Grants Access to Home Video Surveillance

Dark Reading

Due to a shared Amazon S3 credential, all users of a certain model of the Guardzilla All-In-One Video Security System can view each other's videos

Amazon Fixes Ring Video Doorbell Flaw That Leaked Wi-Fi Credentials


Vulnerabilities amazon Amazon Ring Video Doorbell Pro cyberattack IoT Security Smart HomeAttackers could access Wi-Fi credentials due to a problem in initial configuration of the smart doorbell device.

EDPB Adopts Guidelines on Data Processing Through Video Devices

Hunton Privacy

The European Data Protection Board (the “EDPB”) recently adopted its Guidelines 3/2019 on processing of personal data through video devices (the “Guidelines”). Although the Guidelines provide examples of data processing for video surveillance, these examples are not exhaustive. The Guidelines aim to provide guidance on how to apply the EU General Data Protection Regulation (“GDPR”) in all potential areas of video device use.