Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV //

Intrusion

3/2/2017
10:45 AM
Craig Leddy
Craig Leddy
News Analysis-Security Now
50%
50%

Pay-TV Security Gets 50 Shades Darker

Pay-TV providers are seeing new security threats and vulnerabilities every day, and are facing numerous challenges trying to tighten the security that protects organizations, as well as their customers.

During a recent Light Reading Live conference on service provider security, experts made an assessment of the current state of hacking threats, cyber attacks and video piracy that can best be summed up in two words: nothing good.

Following a spate of recent breaches of service provider infrastructure around the globe, security experts foresee an increase in attacks designed to disrupt service, steal confidential data, extort ransom or pirate content. Together, these criminal activities comprise a multi-pronged threat to service providers and the entire pay-TV business.

A new Heavy Reading report, Heavy Reading report, "Pay TV Faces New Security Threats: Are Providers Ready?," assesses the threats, including video piracy and cyber attacks, based upon recent analysis by security technology experts. It discusses the vulnerabilities that can expose service providers, and the new solutions for protection. Included is a chart of ten technology providers that are offering security solutions to US cable providers.

Previously, pay-TV security was a more straightforward process because video was delivered in a linear chain. Cable, telco and satellite companies could employ encryption and conditional access systems (CAS), while content providers could largely rely upon digital rights management (DRM) solutions. But in today's IP world of multiple platforms and devices, security is much more complex and attacks can come from various angles, the report says.

Moreover, service providers and content companies have grown in size and stature, making them more attractive targets for pirates and hackers. Today's providers are in the firing line of activities that are grabbing headlines daily, including global efforts to steal company assets, crash networks and influence political elections.

Last August, a breach of a Charter Communications Inc. headend in Texas resulted in racial hate messages being broadcast on subscribers' TV screens. For TV5Monde, the French programmer, it was 11 channels airing jihadist propaganda for 18 hours. Recent breaches have shut down Internet service by Liberty Global Inc. (Nasdaq: LBTY)'s Ziggo, TalkTalk in the UK and Deutsche Telekom AG (NYSE: DT), and produced well publicized data leaks at Sony Corp. (NYSE: SNE) and Yahoo Inc. (Nasdaq: YHOO).

Based on security experts' assessments, Heavy Reading says service providers are becoming more vulnerable by supporting the very products that are designed to make their services more attractive to customers, including over-the-top (OTT) video, more IP devices, 4K Ultra HD, virtual reality, wireless capability and the Internet of Things (IoT). After security leaks were discovered in IoT devices, such as IP cameras, there's been a stronger push to bake in security from the start.

Despite all of the attention and money being devoted to security in general, providers are in an arms race with their foes -- and they probably are losing. "Hackers learn and evolve faster than we in the industry do," said Jason Boswell, director, security practice, North America, for Ericsson AB (Nasdaq: ERIC), during Light Reading's Service Provider & Enterprise Security Strategies 2016 conference.

When it comes to video theft, "the arms race with pirates absolutely will continue as content continues to get more valuable and devices continue to get more open," said Avni Rambhia, industry principal, digital transformation, for Frost & Sullivan , during a Light Reading webinar with Cisco Systems Inc. (Nasdaq: CSCO) on Holistic Security.

Many service provider organizations have a patchwork of video, Internet and IT security that leaves exposable gaps, according to security experts. Companies end up "almost playing Whac-A-Mole with whichever group has a problem at that time," Rambhia said.

Service providers need to take a holistic approach that integrates solutions and policies into a tight defense, the Heavy Reading report says. They also need to overcome human error that results in exposure. Another form of human error, the report says, is when content providers, including Netflix Inc. (Nasdaq: NFLX) and Home Box Office Inc. (HBO) , condone password-sharing that provides tacit approval of video piracy.

— Craig Leddy, Contributing Analyst, Heavy Reading

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15216
PUBLISHED: 2020-09-29
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
CVE-2020-4607
PUBLISHED: 2020-09-29
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
CVE-2020-24565
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25770
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25771
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...