Skip to main content

Trending In Library Management

Microsoft Patch Tuesday, Febru1

Microsoft is sending the world a whole bunch of love today, in the form of patches to plug dozens of security holes in its Windows operating systems and other software. This year’s special Valentine’s Day Patch Tuesday includes fixes for a whopping three different “zero-day” vulnerabilities that are already being used in active attacks. Microsoft’s […]

Data We Love – Day 2

Data We Love – Day 2

Welcome to the second post in our “Data We Love” blog series! In honor of #LoveDataStanford during #LoveData23, every day this week we are highlighting data in the Stanford Digital Repository that stands out — and deserves a heart-filled shoutout — for being especially loveable! Today we draw your attention to an incredible project focused on […]

Data We Love – Day 1

Data We Love – Day 1

Data We Love – Day 1 | Stanford Libraries You are here accessibilityaccessprivsarrow-circle-rightaskus-chataskus-librarianbarsblogsclosecoffeecomputercomputersulcontactsconversationcopierelectricaloutleteventsexternal-linkfacebook-circlegroupstudyhoursindividual<path d=”M1024 512c0 282.77-229.23 512-512 512S0 794.77 0 512 229.23 0 512 0s512 229.23 512 512z”/><path fill=”#fff” d=”M658.664 832H365.336C269.76 832 192 754.248 192 658.664V365.336C192 269.752 269.76 192 365.336 192h293.328C754.248 192 832 269.752 832 365.336v293.336C832 754.248 754.248 832 658.664 832zM365.336 245.336c-66.168 0-120 53.832-120 120v293.336c0 […]

U.S., U.K. Sanction 7 Men Tied1

Authorities in the United States and United Kingdom today levied financial sanctions against seven men accused of operating “Trickbot,” a cybercrime-as-a-service platform based in Russia that has enabled countless ransomware attacks and bank account takeovers since its debut in 2016. The U.S. Department of the Treasury says the Trickbot group is associated with Russian intelligence […]

KrebsOnSecurity in Upcoming Hu1

KrebsOnSecurity will likely have a decent amount of screen time in an upcoming Hulu documentary series about the 2015 megabreach at marital infidelity site Ashley Madison. While I can’t predict what the producers will do with the video interviews we shot, it’s fair to say the series will explore compelling new clues as to who […]

Finland’s Most-Wanted Hacker N

Julius “Zeekill” Kivimäki, a 25-year-old Finnish man charged with extorting a local online psychotherapy practice and leaking therapy notes for more than 22,000 patients online, was arrested this week in France. A notorious hacker convicted of perpetrating tens of thousands of cybercrimes, Kivimäki had been in hiding since October 2022, when he failed to show […]

Jeremy Singer-Vine’s Data Libe

Jeremy Singer-Vine’s Data Liberation Project

Not to be confused with Canada’s Data Liberation Initiative, Jeremy Singer-Vine is spending his time on the Data Liberation Project, “an initiative to identify, obtain, reformat, clean, document, publish, and disseminate government datasets of public interest.” There’s not yet a lot to look at there, but there’s plenty in the pipeline. I just attended a […]

Presenting “Digitization Exemp

Digital Library Systems and Services (DLSS) has published a new reference resource about the work we produce in digitization services: Digitization Exemplars. This exhibit features an array of examples of each of the kinds of materials that we digitally reformat in our various labs. The purpose of this site is to serve as a reference […]

Experian Glitch Exposing Credi1

On Dec. 23, 2022, KrebsOnSecurity alerted big-three consumer credit reporting bureau Experian that identity thieves had worked out how to bypass its security and access any consumer’s full credit report — armed with nothing more than a person’s name, address, date of birth, and Social Security number. Experian fixed the glitch, but remained silent about […]

Administrator of RSOCKS Proxy 1

Denis Emelyantsev, a 36-year-old Russian man accused of running a massive botnet called RSOCKS that stitched malware into millions of devices worldwide, pleaded guilty to two counts of computer crime violations in a California courtroom this week. The plea comes just months after Emelyantsev was extradited from Bulgaria, where he told investigators, “America is looking […]

Another Hidden Figure in Libra1

Autherine Lucy and lawyers Thurgood Marshall and Arthur Brooks leave the courthouse in Birmingham, Alabama, on February 29, 1956, after the court had ruled Lucy had to be reinstated as a library science student at University of Alabama but before the university’s trustees expelled her later that day. Photo: Library of Congress, Prints & Photographs […]

New T-Mobile Breach Affects 371

T-Mobile today disclosed a data breach affecting tens of millions of customer accounts, its second major data exposure in as many years. In a filing with federal regulators, T-Mobile said an investigation determined that someone abused its systems to harvest subscriber data tied to approximately 37 million current customer accounts. Image: customink.com In a filing […]

Thinking of Hiring or Running 1

Most people who operate DDoS-for-hire businesses attempt to hide their true identities and location. Proprietors of these so-called “booter” or “stresser” services — designed to knock websites and users offline — have long operated in a legally murky area of cybercrime law. But until recently, their biggest concern wasn’t avoiding capture or shutdown by the […]