Copy


Piracy Monitor E-Newsletter: Vol. 1 - Issue 3 - August 14, 2019

From Piracy Monitor, with news and reference about video piracy: piracy cases, their causes, available countermeasures, solutions and research.  Welcome to new subscribers, and thanks for reading!

If this is new to you, please register to subscribe to this E-Newsletter and get access to download Piracy Monitor White Papers.  

Piracy and anti-piracy are the next frontier for rights-holders, content owners and video distributors. 

Piracy Monitor White Paper #2 is now available.  You will have access to all White Papers after registering.

Newsfeed

IBM: Malicious attacks cause 51% of data center breaches

IBM released a report detailing the costs of data breaches to businesses. According to IBM, “In the United States, the average cost of a data breach increased from $7.91 million in 2018 to $8.19 million in 2019… Globally, the average cost of a data breach has increased to $3.92 million.”. (More...)

Film industry submits video piracy comments to US government

On July 29, several movie and television industry organizations submitted a formal response to a request for comments by US Department of Commerce (DoC).  More than 1,000 illegal IPTV services were identified globally.  Piracy and counterfeiting of content via physical media also continues to be a problem. (More...)

US Senate Judiciary Committee convenes piracy oversight hearing

The Registrar of Copyrights and Director of the Copyright Office said that ‘… streaming is something that is continuing to rise, and not having the effective tools to go after the main way in which pirates are operating really does harm the ability for law enforcement to be able to adequately protect the rights of individuals…(More...)

Apple protocol vulnerability opens streaming to attacks

The Apple Wireless Direct Link (AWDL) protocol, which is installed on over 1.2 billion Apple devices, contains vulnerabilities that enable attackers to track users, crash devices, or intercept files transferred between devices via man-in-the-middle (MitM) attacks.” (More...)

Using iMessage to share video credentials?  Then beware!

Google’s Project Zero found multiple vulnerabilities in Apple’s iOS iMessage app, in which “an attacker could exploit them without requiring the owner of the targeted device to do anything. One vulnerability could only be solved by wiping a device with the loss of all data, while another could be used to siphon data off a device.”. (More...)

Sky 'Credential stuffing' attack prompts password resets

Credential stuffing attacks are when hackers use username and password combinations that have been made public through security breaches at other companies, and use them to gain access to accounts on other services, hoping that users had reused passwords across accounts. (More...)

Online video providers seek piracy damages

YouTube caught the attention of a high-level congressional office interested in its copyright-protection practices, an inquiry that comes as the massive video site cracks down on stream ripping, a type of music piracy. Stream ripping swipes audio tracks off YouTube videos and spits them out as MP3 downloads. (More...)


And in our opinion...

Will the new generation of online mega-aggregators drive video piracy? 

There has been a rash of recent speculation that the next wave of mega-online video aggregators will start to push consumers over the edge into video piracy.  Adding up the new services from AT&T, The Walt Disney Company, Comcast, ViacomCBS; not to mention Netflix and others, the costs can eclipse or exceed pay TV (the cost of which drove consumers to streaming in the first place)  (More...)

Email
LinkedIn
Website
Copyright © 2019 Advanced Media Strategies LLC, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list.