Skip to main content

Passive Marketing: Going Digit1

Passive programs in the physical locations are nothing new to libraries; however, with the changing behaviour of visitors, passive programs should be considered on a digital platform as well. Stephen Abram shares his advice on how libraries can start developing their own programs to suit their communities. Read more below! Promoting the Full Digital Library: […]

JA3 Fingerprinting: Functional1

Consequently, if there’s one resounding principle actionable intelligence via internet scanning has taught us, it is that adopting a proactive attitude towards accurate threat identification and correlation is the necessary first step if we are serious (or even care) about evidence-based knowledge and contextualization dictating the flow of any successful investigation. This is particularly true […]

Microsoft Issues Emergency Pat1

Microsoft on Tuesday issued an emergency software update to quash a security bug that’s been dubbed “PrintNightmare,” a critical vulnerability in all supported versions of Windows that is actively being exploited. The fix comes a week ahead of Microsoft’s normal monthly Patch Tuesday release, and follows the publishing of exploit code showing would-be attackers how […]

Another 0-Day Looms for Many W1

Some of Western Digital’s MyCloud-based data storage devices. Image: WD. Countless Western Digital customers saw their MyBook Live network storage drives remotely wiped in the past month thanks to a bug in a product line the company stopped supporting in 2015, as well as a previously unknown zero-day flaw. But there is a similarly serious […]

Intuit to Share Payroll Data f1

Financial services giant Intuit this week informed 1.4 million small businesses using its QuickBooks Online Payroll and Intuit Online Payroll products that their payroll information will be shared with big-three consumer credit bureau Equifax starting later this year unless customers opt out by the end of this month. Intuit says the change is tied to […]

LC Labs Welcomes Computing Cul1

LC Labs Welcomes Computing Cultural Heritage in the Cloud (CCHC) Researchers!

June 2021 LC LABS LETTERA Monthly Roundup of News and Thoughts from the Library of Congress Labs Team Welcome, CCHC researchers! Funded with a 2019 $1 million grant from the Andrew W. Mellon Foundation, the Computing Cultural Heritage in the Cloud (CCHC) initiative aims to better serve research and creative uses of Library of Congress […]

What is the NIST Cybersecurity1

Consequently, cyber attacks have become more widespread and sophisticated, impacting the critical infrastructures of many organizations and gaining access to their most valuable assets. Besides investing in technology, organizations should turn to relevant policies and industry standard frameworks to better inform their practices. It’s a critical step toward keeping data and systems secure and managing […]

Incident Response in Cybersecu1

We often say that in cybersecurity, it’s important to think about “when” an attack will occur, not “if” it will occur. And while being proactive is touted as the key to an organization’s most effective security posture, one should never dismiss the value of reactive security practices, either. Building up your defences against attacks and […]

MyBook Users Urged to Unplug D1

Hard drive giant Western Digital is urging users of its MyBook Live brand of network storage drives to disconnect them from the Internet, warning that malicious hackers are remotely wiping the drives using a critical flaw that can be triggered by anyone who knows the Internet address of an affected device. One of many similar […]

New to me: Google Scholar “Pub

New to me: Google Scholar “Public Access” feature

I was alerted to a new(ish?) feature within Google Scholar earlier this week by this blog post: What does this new Google Scholar “Public Access” feature mean for me or my work? More information on the Google Scholar site itself: https://scholar.google.com/intl/en/scholar/citations.html?1#publicaccess. From that original post: The new Google Scholar feature is a reminder that it […]

The Law of Attraction: Tech an1

On this week’s Princh Library Blog post guest writer Michelle De Aizpurua shares a few pieces of advice on how to attract teens to the library. Technological initiatives that can be used to attract students to the library Attracting young people to the library can often be a challenge, there’s many competing demands on a […]

How Cyber Sleuths Cracked an A1

In 2015, police departments worldwide started finding ATMs compromised with advanced new “shimming” devices made to steal data from chip card transactions. Authorities in the United States and abroad had seized many of these shimmers, but for years couldn’t decrypt the data on the devices. This is a story of ingenuity and happenstance, and how […]

Automatically Populate your OR1

Stanford researchers can now automatically populate their ORCID record with publication data from Stanford Profiles. This new feature allows researchers, many of whom have built out extensive lists of their publications and research outputs in Stanford Profiles over the years, to make their ORCID record equally rich. Further, as they add new publications to their […]

Being Okay With Not Being Okay1

Burnout, depression, anxiety and a slew of mental health issues are becoming more common among cybersecurity professionals. Although workplace stress follows every industry, cybersecurity seems to be particularly susceptible to it. The fact that there is stigma around discussing mental health in the security community does not help either. The modern superheroes who make the […]

Newsmaker: Savala Nolan

Savala Nolan. Photo: Andria Lo As a woman who is mixed race, has experienced elite schools and generational poverty, and has been thin and fat at different times in her life, Savala Nolan has long felt that she occupies in-between spaces in society. The lawyer, speaker, and writer (whose work has appeared in Bust, Time, […]

How Cyber Safe is Your Drinkin1

Amid multiple recent reports of hackers breaking into and tampering with drinking water treatment systems comes a new industry survey with some sobering findings: A majority of the 52,000 separate drinking water systems in the United States still haven’t inventoried some or any of their information technology systems — a basic first step in protecting […]

SUL joins international partne1

Stanford Libraries is embarking on an exciting collaboration with the National Central Library of Taiwan (NCL) to digitize a selection of Chinese rare books in the holdings of the East Asia Library and the Bowes Art & Architecture Library. The scanned titles will be added to the NCL’s Rare Books and Special Collections online database, a […]

First American Financial Pays 1

In May 2019, KrebsOnSecurity broke the news that the website of mortgage settlement giant First American Financial Corp. [NYSE:FAF] was leaking more than 800 million documents — many containing sensitive financial data — related to real estate transactions dating back 16 years. This week, the U.S. Securities and Exchange Commission settled its investigation into the […]