Skip to main content

Trending In Library Management

The Future of Libraries: Navig1

In this week’s Princh Library Blog post, guest writer Jill Brooks discusses how libraries can navigate their digital transformation, including some of the challenges libraries face and the tools they can utilize. Enjoy! Libraries have long stood as bastions of knowledge, evolving through centuries from exclusive archives of scrolls to community hubs bustling with activity […]

Russian FSB Counterintelligenc1

The head of counterintelligence for a division of the Russian Federal Security Service (FSB) was sentenced last week to nine years in a penal colony for accepting a USD $1.7 million bribe to ignore the activities of a prolific Russian cybercrime group that hacked thousands of e-commerce websites. The protection scheme was exposed in 2022 […]

Library Spaces & Clean Air: Th

In this week’s Princh Library Blog, guest writer Nina Grant talks about something that’s always present, but rarely thought about; air, or more precisely, the air quality in libraries, and how certain activities can be the source of major air pollution. Enjoy! Think about the last time you walked into a library. The smell of […]

Library Spaces & Clean Air: Th

In this week’s Princh Library Blog, guest writer Nina Grant talks about something that’s always present, but rarely thought about; air, or more precisely, the air quality in libraries, and how certain activities can be the source of major air pollution. Enjoy! Think about the last time you walked into a library. The smell of […]

Newsmaker: Dulcé Sloan

Dulcé Sloan Photo: Bronson Farr Two decades ago, while Daily Show Senior Correspondent Dulcé Sloan was doing summer shows at a community theater in Quakertown, Pennsylvania, the library was her main hangout spot. In the small town of 9,000 people, it was a place to gather with other young actors—and the only place with internet […]

Who Stole 3.6M Tax Records fro1

For nearly a dozen years, residents of South Carolina have been kept in the dark by state and federal investigators over who was responsible for hacking into the state’s revenue department in 2012 and stealing tax and bank account information for 3.6 million people. The answer may no longer be a mystery: KrebsOnSecurity found compelling […]

Crickets from Chirp Systems in1

The U.S. government is warning that “smart locks” securing entry to an estimated 50,000 dwellings nationwide contain hard-coded credentials that can be used to remotely open any of the locks. The lock’s maker Chirp Systems remains unresponsive, even though it was first notified about the critical weakness in March 2021. Meanwhile, Chirp’s parent company, RealPage, […]

Why CISA is Warning CISOs Abou1

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today it is investigating a breach at business intelligence company Sisense, whose products are designed to allow companies to view the status of multiple third-party online services in a single dashboard. CISA urged all Sisense customers to reset any credentials and secrets that may have been […]

Library Advocacy: How Individu1

In this week’s Princh Library Blog post, guest writer Sam L. Bowman explores how both individuals and businesses can practice library advocacy and contribute to their local libraries. Enjoy! Your local library is the perfect place to connect with your community and learn more about the world around you. Volunteering with a library can enrich […]

Library Advocacy: How Individu1

In this week’s Princh Library Blog post, guest writer Sam L. Bowman explores how both individuals and businesses can practice library advocacy and contribute to their local libraries. Enjoy! Your local library is the perfect place to connect with your community and learn more about the world around you. Volunteering with a library can enrich […]

Twitter’s Clumsy Pivot to X.co

On April 9, Twitter/X began automatically modifying links that mention “twitter.com” to read “x.com” instead. But over the past 48 hours, dozens of new domain names have been registered that demonstrate how this change could be used to craft convincing phishing links — such as fedetwitter[.]com, which until very recently rendered as fedex.com in tweets. […]

Fake Lawsuit Threat Exposes Pr1

A cybercrook who has been setting up websites that mimic the self-destructing message service privnote.com accidentally exposed the breadth of their operations recently when they threatened to sue a software company. The disclosure revealed a profitable network of phishing sites that behave and look like the real Privnote, except that any messages containing cryptocurrency addresses […]

Where the Intellectual Realm M1

In today’s world, libraries stand as iconic institutions, appreciated for nurturing intellectual growth, raising passion for reading, preserving literature, and fostering cultural exploration. Yet, in their evolution, libraries are embracing a dynamic role that extends beyond books and into the field of sports. As representative institutions of culture, these community hubs are uniquely positioned to […]

Where the Intellectual Realm M1

In today’s world, libraries stand as iconic institutions, appreciated for nurturing intellectual growth, raising passion for reading, preserving literature, and fostering cultural exploration. Yet, in their evolution, libraries are embracing a dynamic role that extends beyond books and into the field of sports. As representative institutions of culture, these community hubs are uniquely positioned to […]

‘The Manipulaters’ Improve Phi

Roughly nine years ago, KrebsOnSecurity profiled a Pakistan-based cybercrime group called “The Manipulaters,” a sprawling web hosting network of phishing and spam delivery platforms. In January 2024, The Manipulaters pleaded with this author to unpublish previous stories about their work, claiming the group had turned over a new leaf and gone legitimate. But new research […]

Thread Hijacking: Phishes That1

Thread hijacking attacks. They happen when someone you know has their email account compromised, and you are suddenly dropped into an existing conversation between the sender and someone else. These missives draw on the recipient’s natural curiosity about being copied on a private discussion, which is modified to include a malicious link or attachment. Here’s […]

Recent ‘MFA Bombing’ Attacks T

Several Apple customers recently reported being targeted in elaborate phishing attacks that involve what appears to be a bug in Apple’s password reset feature. In this scenario, a target’s Apple devices are forced to display dozens of system-level prompts that prevent the devices from being used until the recipient responds “Allow” or “Don’t Allow” to […]

Mozilla Drops Onerep After CEO1

The nonprofit organization that supports the Firefox web browser said today it is winding down its new partnership with Onerep, an identity protection service recently bundled with Firefox that offers to remove users from hundreds of people-search sites. The move comes just days after a report by KrebsOnSecurity forced Onerep’s CEO to admit that he […]

Learning From Lived Experience1

In this week’s Princh Library Blog post, the Public Library Accessibility Resource Center (PLARC) project team discusses their history, why accessible libraries are important, and how you can start assessing your library’s accessibility. Enjoy! “I went to where the audiobooks were and looked for some titles to borrow.  I was using my hand-held magnifier and […]