Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV //

Intrusion

3/2/2017
10:45 AM
Craig Leddy
Craig Leddy
News Analysis-Security Now
50%
50%

Pay-TV Security Gets 50 Shades Darker

Pay-TV providers are seeing new security threats and vulnerabilities every day, and are facing numerous challenges trying to tighten the security that protects organizations, as well as their customers.

During a recent Light Reading Live conference on service provider security, experts made an assessment of the current state of hacking threats, cyber attacks and video piracy that can best be summed up in two words: nothing good.

Following a spate of recent breaches of service provider infrastructure around the globe, security experts foresee an increase in attacks designed to disrupt service, steal confidential data, extort ransom or pirate content. Together, these criminal activities comprise a multi-pronged threat to service providers and the entire pay-TV business.

A new Heavy Reading report, Heavy Reading report, "Pay TV Faces New Security Threats: Are Providers Ready?," assesses the threats, including video piracy and cyber attacks, based upon recent analysis by security technology experts. It discusses the vulnerabilities that can expose service providers, and the new solutions for protection. Included is a chart of ten technology providers that are offering security solutions to US cable providers.

Previously, pay-TV security was a more straightforward process because video was delivered in a linear chain. Cable, telco and satellite companies could employ encryption and conditional access systems (CAS), while content providers could largely rely upon digital rights management (DRM) solutions. But in today's IP world of multiple platforms and devices, security is much more complex and attacks can come from various angles, the report says.

Moreover, service providers and content companies have grown in size and stature, making them more attractive targets for pirates and hackers. Today's providers are in the firing line of activities that are grabbing headlines daily, including global efforts to steal company assets, crash networks and influence political elections.

Last August, a breach of a Charter Communications Inc. headend in Texas resulted in racial hate messages being broadcast on subscribers' TV screens. For TV5Monde, the French programmer, it was 11 channels airing jihadist propaganda for 18 hours. Recent breaches have shut down Internet service by Liberty Global Inc. (Nasdaq: LBTY)'s Ziggo, TalkTalk in the UK and Deutsche Telekom AG (NYSE: DT), and produced well publicized data leaks at Sony Corp. (NYSE: SNE) and Yahoo Inc. (Nasdaq: YHOO).

Based on security experts' assessments, Heavy Reading says service providers are becoming more vulnerable by supporting the very products that are designed to make their services more attractive to customers, including over-the-top (OTT) video, more IP devices, 4K Ultra HD, virtual reality, wireless capability and the Internet of Things (IoT). After security leaks were discovered in IoT devices, such as IP cameras, there's been a stronger push to bake in security from the start.

Despite all of the attention and money being devoted to security in general, providers are in an arms race with their foes -- and they probably are losing. "Hackers learn and evolve faster than we in the industry do," said Jason Boswell, director, security practice, North America, for Ericsson AB (Nasdaq: ERIC), during Light Reading's Service Provider & Enterprise Security Strategies 2016 conference.

When it comes to video theft, "the arms race with pirates absolutely will continue as content continues to get more valuable and devices continue to get more open," said Avni Rambhia, industry principal, digital transformation, for Frost & Sullivan , during a Light Reading webinar with Cisco Systems Inc. (Nasdaq: CSCO) on Holistic Security.

Many service provider organizations have a patchwork of video, Internet and IT security that leaves exposable gaps, according to security experts. Companies end up "almost playing Whac-A-Mole with whichever group has a problem at that time," Rambhia said.

Service providers need to take a holistic approach that integrates solutions and policies into a tight defense, the Heavy Reading report says. They also need to overcome human error that results in exposure. Another form of human error, the report says, is when content providers, including Netflix Inc. (Nasdaq: NFLX) and Home Box Office Inc. (HBO) , condone password-sharing that provides tacit approval of video piracy.

— Craig Leddy, Contributing Analyst, Heavy Reading

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15208
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
CVE-2020-15209
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
CVE-2020-15210
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
CVE-2020-15211
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
CVE-2020-15212
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...