Skip to main content

T-Mobile Investigating Claims 1

Communications giant T-Mobile said today it is investigating the extent of a breach that hackers claim has exposed sensitive personal data on 100 million T-Mobile USA customers, in many cases including the name, Social Security number, address, date of birth, phone number, security PINs and details that uniquely identify each customer’s mobile device. On Sunday, […]

New Anti Anti-Money Laundering1

A new dark web service is marketing to cybercriminals who are curious to see how their various cryptocurrency holdings and transactions may be linked to known criminal activity. Dubbed “Antinalysis,” the service purports to offer a glimpse into how one’s payment activity might be flagged by law enforcement agencies and private companies that try to […]

How SEO Can Make Online Librar1

Making your online library accessible and easy-to-find for your users is key in today’s digitized word. If a user cannot find your online library, the content and resources you are sharing on your page lose their purpose. SEO can help your library be more visible and accessible. But, what is SEO? Guest writer, Robin Jeanne, […]

Microsoft Patch Tuesday, Augus1

Microsoft today released software updates to plug at least 44 security vulnerabilities in its Windows operating systems and related products. The software giant warned that attackers already are pouncing on one of the flaws, which ironically enough involves an easy-to-exploit bug in the software component responsible for patching Windows 10 PCs and Windows Server 2019 […]

Passing the Mic to Our Audienc1

This is a guest post written by Hilary Szu Yin Shiue and Jacob Kowall, 2021 Junior Fellows in the Digital Content Management & Services (DCMS) Division under the mentorship of Kate Murray, Digital Projects Coordinator. Hilary and Jacob assisted in updating and expanding the Sustainability of Digital Formats website, which provides information and analysis on […]

Ransomware Gangs and the Name 1

It’s nice when ransomware gangs have their bitcoin stolen, malware servers shut down, or are otherwise forced to disband. We hang on to these occasional victories because history tells us that most ransomware moneymaking collectives don’t go away so much as reinvent themselves under a new name, with new rules, targets and weaponry. Indeed, some […]

Announcing the new SDR Self-de1

Announcing the new SDR Self-deposit Application

We are excited to announce the release of a new, online self-deposit application for the Stanford Digital Repository, with a brand-new user interface. The new application was designed with a focus on improved accessibility and better future support for Open Access as well as other campus research and digital library needs. Much of the content […]

Collective Wisdom: Book Sprint1

The following is a post by Senior Innovation Specialist Meghan Ferriter about the Collective Wisdom initiative. Collective Wisdom  seeks to identify and enrich networks of practitioners of crowdsourcing in cultural heritage, document current practices, and invite others to join in thoughtful consideration of future practices. Supported by an Arts & Humanities Research Council UK US-UK […]

Enhancing access to streaming 1

This post was collectively authored by Andrew Berger, Dinah Handel, and Geoff Willard   Project goals Digitization of audiovisual resources is only the first step in ensuring their contents are seen by many for years to come. In order for our audiovisual heritage to be truly accessible by all, it needs corresponding captions in a […]

All Hyped Up for HyperCard: Fu1

This is a guest post written by Jacob Kowall and Hilary Szu Yin Shiue, 2021 Junior Fellows in the Digital Collections Management & Services Division (DCMS) under the mentorship of Kate Murray, Digital Projects Coordinator. Jacob and Hilary assisted in updating and expanding the Sustainability of Digital Formats website, which provides information and analysis on […]

The Life Cycle of a Breached D1

Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time the victim organization discloses an incident publicly the information has already been harvested many times over by profit-seeking cybercriminals. Here’s a closer look at what typically […]

LC Labs Letter: July 2021

LC Labs Letter: July 2021

July 2021 LC LABS LETTERA Monthly Roundup of News and Thoughts from the Library of Congress Labs Team Our Projects LC Labs publishes “Library of Congress Digital Scholarship Research Guide” Have you ever wanted to use digital Library of Congress materials but weren’t quite sure where to start? Well then, we have just the guide […]

PlugwalkJoe Does the Perp Walk

Joseph “PlugwalkJoe” O’Connor, in a photo from a paid press release on Sept. 02, 2020, pitching him as a trustworthy cryptocurrency expert and advisor. One day after last summer’s mass-hack of Twitter, KrebsOnSecurity wrote that 22-year-old British citizen Joseph “PlugwalkJoe” O’Connor appeared to have been involved in the incident. When the U.S. Justice Department last […]

RFS 2.0 – A Year On

RFS 2.0 – A Year On

Today’s guest post is from Kate Murray (Digital Projects Coordinator, Digital Collections Management & Services Division), Marcus Nappier (Digital Collections Specialist, Digital Content Management Section), and Ted Westervelt (Chief, US/Anglo Division) at the Library of Congress. Introduction As the Library of Congress expands its digital collecting activities, the Recommended Formats Statement (RFS) has revised its […]

Computing Cultural Heritage in1

The following is a post by Alice Goldfarb, an LC Labs team Innovation Specialist working on the Computing Cultural Heritage in the Cloud (CCHC) initiative at the Library. As we recently announced, we are working with three digital humanities researchers as part of the Computing Cultural Heritage in the Cloud (CCHC) initiative, where we are […]

AssetFinder: A Handy Subdomain1

The process of discovering “what service is hosted where” can prevent most common causes of security-related incidents. Things like outdated installs, abandoned installations and in-development software running on publicly accessible domains are a major source of such attacks. Domain and specially subdomain discovery is a critical skill for hackers, security researchers and pentesters. Therefore, using […]

Serial Swatter Who Caused Deat1

A 18-year-old Tennessee man who helped set in motion a fraudulent distress call to police that lead to the death of a 60-year-old grandfather in 2020 was sentenced to 60 months in prison today. 60-year-old Mark Herring died of a heart attack after police surrounded his home in response to a swatting attack. Shane Sonderman, […]

More proof that information wa1

More proof that information wants to be free?

Originally noted by ResearchBuzz, from PsyPost: The “Sci-Hub effect” can almost double the citations of research articles, study suggests. The researchers found that articles downloaded from Sci-Hub were cited more frequently compared to articles not downloaded from Sci-Hub. After controlling for variables such as the number of figures included in a paper, title length, the […]