Skip to main content

Black Lives Matter

I was born in 1968, a year many describe as the most tumultuous of the second half of the 20th century. Martin Luther King Jr. was murdered April 4, 1968, as he was protesting the conditions of Memphis sanitation workers whose rallying call was “I Am a Man.” Presidential candidate Robert Kennedy was murdered while […]

COVID-19 ‘Breach Bubble’ Waiti

The COVID-19 pandemic has made it harder for banks to trace the source of payment card data stolen from smaller, hacked online merchants. On the plus side, months of quarantine have massively decreased demand for account information that thieves buy and use to create physical counterfeit credit cards. But fraud experts say recent developments suggest […]

New Charges, Sentencing in Sat1

The U.S. Justice Department today charged a Canadian and a Northern Ireland man for allegedly conspiring to build botnets that enslaved hundreds of thousands of routers and other Internet of Things (IoT) devices for use in large-scale distributed denial-of-service (DDoS) attacks. In addition, a defendant in the United States was sentenced today to drug treatment […]

Attack Surface Analysis: APT “

This picture shows someone’s intentions in broad daylight, but it’s also easy to get information related to an office’s WiFi access points from a stealthier position, let’s say from inside a car in the parking lot, or from somewhere off the premises. While this may sound like a usual approach for conducting an attack against […]

Selected Datasets: A New Libra1

Friends, data wranglers, lend me your ears; The Library of Congress’ Selected Datasets Collection is now live! You can now download datasets of the Simple English Wikipedia, the Atlas of Historical County Boundaries, sports economic data, half a million emails from Enron, and urban soil lead abatement from this online collection. This initial set of […]

Top 100+ Best Security Compani1

Considering their growing attack surface along with the increased sophistication of threat actors, organizations are now turning to different cyber security companies and vendors for help, with cybersecurity remaining the real “it” area of IT spending. Security companies and vendors aid organizations and their security teams by providing them with solutions for network security, cloud […]

Digital library services news 1

Welcome to the Spring 2020 Digital Library Services Newsletter, prepared by the Product and Service Management team! This newsletter includes contributions from: Cathy Aster, Hannah Frost, Dinah Handel, Sarah Seestone, Andrew Berger, Jacob Hill, and Michael Olson.  The Digital Library of the Middle East  The Digital Library of the Middle East (DLME), which aims to become one […]

Digital library services news 1

Welcome to the Spring 2020 Digital Library Services Newsletter, prepared by the Product and Service Management team! This newsletter includes contributions from: Cathy Aster, Hannah Frost, Dinah Handel, Sarah Seestone, Andrew Berger, Jacob Hill, and Michael Olson.  The Digital Library of the Middle East  The Digital Library of the Middle East (DLME), which aims to become one […]

‘BlueLeaks’ Exposes Files from

Hundreds of thousands of potentially sensitive files from police departments across the United States were leaked online last week. The collection, dubbed “BlueLeaks” and made searchable online, stems from a security breach at a Texas web design and hosting company that maintains a number of state law enforcement data-sharing portals. The collection — nearly 270 […]

Turn on MFA Before Crooks Do I1

Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen. But people who don’t take advantage of these added safeguards may find it far more difficult to regain access when their account gets hacked, because increasingly thieves will […]

Our production team: working i1

By Linda Lam, Laura Nguyen, Tati Scutelnic, and Astrid J. Smith As the daily work of Stanford Library’s Digital Production Group (DPG) is primarily hands-on, imaging and performing post-production work on images of collections materials, making the switch to working from home while sheltering in place has taken patience, flexibility, and creativity. Coordinators and imaging […]

Our production team: working i1

By Linda Lam, Laura Nguyen, Tati Scutelnic, and Astrid J. Smith As the daily work of Stanford Library’s Digital Production Group (DPG) is primarily hands-on, imaging and performing post-production work on images of collections materials, making the switch to working from home while sheltering in place has taken patience, flexibility, and creativity. Coordinators and imaging […]

Our production team: working i1

By Linda Lam, Laura Nguyen, Tati Scutelnic, and Astrid J. Smith As the daily work of Stanford Library’s Digital Production Group (DPG) is primarily hands-on, imaging and performing post-production work on images of collections materials, making the switch to working from home while sheltering in place has taken patience, flexibility, and creativity. Coordinators and imaging […]

FEMA IT Specialist Charged in 1

An information technology specialist at the Federal Emergency Management Agency (FEMA) was arrested this week on suspicion of hacking into the human resource databases of University of Pittsburgh Medical Center (UPMC) in 2014, stealing personal data on more than 65,000 UPMC employees, and selling the data on the dark web. On June 16, authorities in […]

Experimenting with speech-to-t1

This guest blog post is shared by Chris Adams, Solutions Architect in the Office of the Chief Information Officer/IT Design & Development Directorate, and Julia Kim, Digital Projects Coordinator at the National Library for the Blind and Print Disabled at the Library of Congress, formerly the Digital Assets Specialist at the American Folklife Center, supporting […]

Privnotes.com Is Phishing Bitc1

For the past year, a site called Privnotes.com has been impersonating Privnote.com, a legitimate, free service that offers private, encrypted messages which self-destruct automatically after they are read. Until recently, I couldn’t quite work out what Privnotes was up to, but today it became crystal clear: Any messages containing bitcoin addresses will be automatically altered […]