Face Off: Researchers Battle AI-Generated Deep Fake Videos

Data Breach Today

Video 183

Detecting Fake Videos

Schneier on Security

This story nicely illustrates the arms race between technologies to create fake videos and technologies to detect fake videos: These fakes, while convincing if you watch a few seconds on a phone screen, aren't perfect (yet). academicpapers behavioraldetection fraud video

Video 56

Critical flaw affects Cisco Video Surveillance Manager

Security Affairs

Cisco has patched a critical vulnerability in the Cisco Video Surveillance Manager (VSM) could be exploited by an unauthenticated remote attacker to gain root access. The vulnerability impacts Cisco Video Surveillance Manager (VSM) Software releases 7.10, 7.11, and 7.11.1.

Video 76

Hackers Deface Popular Videos Published by Vevo

Data Breach Today

Pilfered Access Credentials Could Be to Blame A handful of popular music videos published on YouTube were defaced on Tuesday, with two hackers claiming credit.

Video 137

Threat Modeling in 2018 (video release)

Adam Shostack

Blackhat has released all the 2018 US conference videos. My threat modeling in 2018 video is, of course, amongst them. Slides are linked here. threat modeling

Video 65

Video Interview: Know Your (Digital) Customer

Data Breach Today

IBM's Shaked Vax on Validating Digital Identities with Physical Identities to Protect Accounts In the wake of so many mega-breaches, new account fraud is easier to perpetrate than account takeovers.

Video 137

New Video Course for State Agencies

The Texas Record

We are pleased to announce a new online video course for state agency records management officers and records liaisons. Click here to access the video on the course page. We will be further developing our online courses to add video and interactive functionality, so stay tuned for more.

Video: How Automation and Machine Learning Power Future of SIEM

The Security Ledger

Interview RSA Security Conversations Video Black Hat conferences encryption privacy software trendsIn this interview with The Security Ledger, Amy Blackshaw of RSA talks about how the company’s Netwitness SIEM product is evolving to keep pace with a fast -evolving security market.

Video 52

What’s NewCo? These Videos Will Help

John Battelle's Searchblog

These Videos Will Help appeared first on John Battelle's Search Blog. The NewCo festival model is counter-intuitive, so we made these videos to help explain what the fuss is all about. These Videos Will Help appeared first on John Battelle's Search Blog.

Video 91

RSA Conference Preview: More Video Interviews in 2018

Data Breach Today

Leading the latest edition of the ISMG Security Report: A preview of our extensive coverage of the 2018 RSA Conference, which will include dozens of video interviews with thought leaders

Video 100

Video: Bishop Fox on Device Threats and Layered Security

Threatpost

Black Hat Videos Black Hat USA IoT IoT security SecurityBishop Fox's Christie Terrill talks to us about IoT security and other trends at Black Hat 2018 this month.

Video 66

[Video] Offsite Document Storage Facilities

Record Nations

The post [Video] Offsite Document Storage Facilities appeared first on Record Nations.

Video 56

Security Vulnerabilities in Star Wars

Data Breach Today

A fun video describing some of the many Empire security vulnerabilities in the first Star Wars movie. humor securityawareness video vulnerabilitiesHappy New Year, everyone.

Information Governance vs Records Management [Video]

Record Nations

Video Transcript Recognizing the Difference The terms “records management” and “information governance” are often used interchangeably. The post Information Governance vs Records Management [Video] appeared first on Record Nations.

Black Hat Exclusive Video: The IoT Security Threat Looms for Enterprises

Threatpost

Black Hat IoT Videos Armis DDoS attack DEF CON IoT securityArmis' CTO discusses the top IoT security issues in the marketplace today - and whether device manufacturers will start to prioritize security.

Video 74

How to deliver malware using weaponized Microsoft Office docs embedding YouTube video

Security Affairs

Researchers at Cymulate security firm devised a new stealthy technique to deliver malware leveraging videos embedded into weaponized Microsoft Office Documents. The technique could be used to execute JavaScript code when a user clicks on a weaponized YouTube video thumbnail embedded in a Weaponized Office document. “Cymulate’s research team has discovered a way to abuse the Online Video feature on Microsoft Word to execute malicious code.

Video 82

Hackers can compromise your WhatsApp account by tricking you into answering a video call

Security Affairs

Hackers can compromise your WhatsApp account by tricking you into answering a video call, the company fixed the flaw in September. Memory corruption bug in WhatsApp's non-WebRTC video conferencing implementation [link].

Video 92

[Video] 2017 Records Retention: Requirements and Guidelines

Record Nations

Video Transcription Why Track Retention? The post [Video] 2017 Records Retention: Requirements and Guidelines appeared first on Record Nations.

Video 60

InfoGovCon 2016 Promo Video

JKevinParker

Check out the new promo video for InfoGovCon 2016 ! I'm excited to be one of the speakers for this exciting event. You should come! Learn more at: www.InfoGovCon.com. InfoGovCon

Video 52

Critical Vulnerability Found in Cisco Video Surveillance Manager

Threatpost

Cisco has patched vulnerability in its video surveillance manager software that could give an unauthenticated, remote attacker the ability to execute arbitrary commands on targeted systems. IoT Vulnerabilities Cisco critical patch surveillance manager vulnerability

Video 80

Video as Grammar: The Supercut

John Battelle's Searchblog

As early as 2003, which was the first year I began writing this site, I wrote about the idea of “video as grammar.” ” By this I meant (and mean) that I foresaw a day when our culture communicated with itself using video much as we currently use text.

Video 83

Records Storage: Pricing Out a Storage Project [Video]

Record Nations

In the video below, you can discover the factors that influence a records storage service and if it is a viable option for your business. Video Transcription Records Storage: Pricing […].

Video 68

Black Hat Video Exclusive: Mobile APTs Redefining Phishing Attacks

Threatpost

Black Hat Government Malware Mobile Security apt Dark Caracal Lookout mike murray mobile apt mobile malware Phishing Stealth Mango video interviewMike Murray, vice president of security intelligence at Lookout, discusses how mobile is redefining phishing, taking it out of the traditional inbox and into SMS and Facebook messages.

Video 51

The 140 Character Video Is Six Seconds Long

John Battelle's Searchblog

The post The 140 Character Video Is Six Seconds Long appeared first on John Battelle's Search Blog. Twitter announced its integration of Vine today , and to put not too fine a point on it, the service is, in essence, a way to create a video tweet.

Video 108

U.S. Court Allows Video Deposition Over EU Deponent’s Privacy Objections

HL Chronicle of Data Protection

litigant’s right to obtain discovery, including video-taped depositions. Still, to “ease [the deponent’s] privacy concerns,” the judge ordered that the video component of the deposition not be publicly disclosed or otherwise released outside of the current litigation. A U.S.

Video 52

Data Backups: Types and Methods [Video]

Record Nations

The post Data Backups: Types and Methods [Video] appeared first on Record Nations. Data backup is an essential process to ensure business stability and security. Any data that isn’t backed up regularly risks being lost, stolen, or accidentally deleted.

Video 60

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Security Affairs

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber crime syndicates. video streams that are viewed). This user seems to at least have permissions to access/view video streams.”

Video 79

The Logan Paul "Suicide Forest" Video Should Be a Reckoning For YouTube

WIRED Threat Level

Logan Paul's video of Japan's "suicide forest" was a nadir for the YouTube star—and the platform that enables him. Security

Video 87

Friday Squid Blogging: Capturing the Giant Squid on Video

Schneier on Security

In this 2013 TED talk, oceanographer Edith Widder explains how her team captured the giant squid on video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

Video 58

e-Records 2017: Video and Wrap Up

The Texas Record

To close out this year’s e-Records Conference coverage, here is a listing of all the session recaps and a video produced by TSLAC’s Communications team. Video: News eRecords eRecords 2017 Local Governments State Agencies TSLAC

Video 52

New Video Wall: Goods & Services–Businesses in Vancouver

Archives Blogs

Our latest video wall showcases the types of businesses that have operated in the city over time. Many of the photographs used in this video wall show were found in the Stuart Thomson fonds (AM1535), the Jack Lindsay Ltd.

On Disguise

Schneier on Security

The former CIA Chief of Disguise has a fascinating video about her work. cia disguise espionage video

Video 70

Food and Drink: New Video Wall Show

Archives Blogs

Over the past several years, five video wall shows centering on various themes have been created at the Archives. The video wall shows highlight the diverse nature of our photograph, video, and textual holdings. One of the photographs included in the video wall show.

Video 35

Vancouver Elections: New Video Wall Show

Archives Blogs

With the 2018 civic election set for October 20, and advance polls October 10-17, we couldn’t pass up the opportunity to search through our holdings to see what election-related material would make an interesting and new video wall show.

Video 26

Facebook is designing its own chips to help filter live videos

Information Management Resources

More and more smartphones let users take advantage of speech recognition, augmented and virtual reality, as well as image and video processing directly on their devices. Hardware and software Artificial intelligence Facebook

Video 76

Security bug in Swann IoT Camera allowed to access video feeds

Security Affairs

Security experts have discovered a security glitch in Swann IoT camera that could be exploited by attackers to access video feeds. The affected camera model it a battery-powered HD camera that implements video streaming feature either directly over the local network or via a cloud service.

IoT 62

Script Kiddies, Criminals Hacking Video Streams for Fun & Profit

Dark Reading

Video streams are getting hijacked for 'prestige,' DDoS, and financial gain, a new report found

Video 42

Android Apps Are Sharing Screenshots, Video Recordings to Third Parties, Report Finds

Threatpost

Some mobile apps can take and share screenshots and video of the phones’ app activity without users’ knowledge. Mobile Security Privacy Android Android APKs Android app app app permissions google gopuff Mobile security test fairy

Video 61

The Web 2 Debrief Video

John Battelle's Searchblog

Here's the video Almost immediately after the Web 2.0 Summit last month, Tim O'Reilly and I sat down at an FM event and debriefed each other on what we learned.

Video 62

Facebook apologises for storing draft videos users thought they had deleted

The Guardian Data Protection

Facebook says ‘bug’ resulted in videos being kept, while CEO Mark Zuckerberg hits back at Apple chief Tim Cook’s ‘extremely glib’ attack Facebook continues to deal with the fallout of the Cambridge Analytica files , announcing policy changes and bug fixes aimed at undoing some of the company’s more controversial data collection features.

Friday Squid Blogging: Australian Fisherman Gets Inked

Schneier on Security

Pretty good video. squid videoAs usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

Blog 57

Records vs Documents: The Differences & How Best to Manage Them [Video]

Record Nations

Video Transcription Document vs Record Definitions Documents A document refers to “live” information that has not been made final. The post Records vs Documents: The Differences & How Best to Manage Them [Video] appeared first on Record Nations. Records and documents are actually classified differently in the professional space. Understanding their differences and the best ways to manage them will go a long way in keeping your business organized and secure.

On Media, Ro Khanna, the NSA, and the Future of the Internet: Bloomberg Video

John Battelle's Searchblog

The post On Media, Ro Khanna, the NSA, and the Future of the Internet: Bloomberg Video appeared first on John Battelle's Search Blog. I had a chance to go on Bloomberg today and co-host with Cory and Emily, which was fun.

Video 103