Skip to main content

Trending In Library Management

Why 8kun Went Offline During t1

The latest Jan. 6 committee hearing on Tuesday examined the role of conspiracy theory communities like 8kun[.]top and TheDonald[.]win in helping to organize and galvanize supporters who responded to former President Trump’s invitation to “be wild” in Washington, D.C. on that chaotic day. At the same time the committee was hearing video testimony from 8kun […]

Newsmaker: John Cho

Photo: EPNAC Pulling from his experiences living in Los Angeles during the 1992 riots following the Rodney King verdict, actor John Cho has written Troublemaker (Little, Brown and Company), his debut middle-grade novel. The book, released in March, follows 12-year-old Jordan in the wake of the riots while he balances school and complicated family dynamics. […]

Microsoft Patch Tuesday, July 1

Microsoft today released updates to fix at least 86 security vulnerabilities in its Windows operating systems and other software, including a weakness in all supported versions of Windows that Microsoft warns is actively being exploited. The software giant also has made a controversial decision to put the brakes on a plan to block macros in […]

Experian, You Have Some Explai1

Twice in the past month KrebsOnSecurity has heard from readers who’ve had their accounts at big-three credit bureau Experian hacked and updated with a new email address that wasn’t theirs. In both cases the readers used password managers to select strong, unique passwords for their Experian accounts. Research suggests identity thieves were able to hijack […]

Continuous Professional Develo1

In this week’s Princh Library Blog, we share an article by Susan Schneur, Public Library Innovation Porgramme Capacity Building Manager at EIFL. The article reflects on the process and impact of EIFL’s continuous professional development programme in Kenya. This article was originally posted on EIFL’s blog, to see the original article, click here. Are you […]

The Link Between AWM Proxy & t

On December 7, 2021, Google announced it was suing two Russian men allegedly responsible for operating the Glupteba botnet, a global malware menace that has infected millions of computers over the past decade. That same day, AWM Proxy — a 14-year-old anonymity service that rents hacked PCs to cybercriminals — suddenly went offline. Security experts […]

Library Podcasting, Inspiratio1

In this week’s blog post, guest writer and co-host of the The Library Pros podcast, Chris DeCristofaro shares his story; how the inspiration for a library technology podcast came to him, the pod’s early days and what it evolved to nowadays. Are you curious what Princh can offer for your library and your patrons? Then […]

Cathy Aster promoted to Senior1

I am truly happy to announce Cathy Aster’s promotion to Senior Digital Library Services Manager in Digital Library Systems and Services (DLSS).  Cathy is widely recognized by her colleagues as a superb project manager, model service manager, gifted meeting facilitator, supportive mentor, and steadfast advocate for organizational effectiveness in DLSS and Stanford Libraries. In recent […]

Meet the Administrators of the1

Authorities in the United States, Germany, the Netherlands and the U.K. last week said they dismantled the “RSOCKS” botnet, a collection of millions of hacked devices that were sold as “proxies” to cybercriminals looking for ways to route their malicious traffic through someone else’s computer. While the coordinated action did not name the Russian hackers […]

Microsoft Patch Tuesday, June 1

Microsoft on Tuesday released software updates to fix 60 security vulnerabilities in its Windows operating systems and other software, including a zero-day flaw in all supported Microsoft Office versions on all flavors of Windows that’s seen active exploitation for at least two months now. On a lighter note, Microsoft is officially retiring its Internet Explorer […]

Ransomware Group Debuts Search1

Cybercrime groups that specialize in stealing corporate data and demanding a ransom not to publish it have tried countless approaches to shaming their victims into paying. The latest innovation in ratcheting up the heat comes from the ALPHV/BlackCat ransomware group, which has traditionally published any stolen victim data on the Dark Web. Today, however, the […]

“Downthem” DDoS-for-Hire Boss

A 33-year-old Illinois man was sentenced to two years in prison today following his conviction last year for operating services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against hundreds of thousands of Internet users and websites. The user interface for Downthem[.]org. Matthew Gatrel of St. Charles, Ill. was found guilty for […]

Adconion Execs Plead Guilty in1

At the outset of their federal criminal trial for hijacking vast swaths of Internet addresses for use in large-scale email spam campaigns, three current or former executives at online advertising firm Adconion Direct (now Amobee) have pleaded guilty to lesser misdemeanor charges of fraud and misrepresentation via email. In October 2018, prosecutors in the Southern District […]

Two Steps Behind

In this week’s blog, recurring guest writer Edgardo Civallero writes a conceptual piece, using a creative analogy between music and libraries. This interesting correlation he writes about was established from the many conversations and hours of research Edgardo invests his time into, as he works and travels to different libraries in many countries throughout South […]

KrebsOnSecurity in New Netflix1

Netflix has a new documentary series airing next week — “Web of Make Believe: Death, Lies & the Internet” — in which Yours Truly apparently has a decent amount of screen time. The debut episode explores the far-too-common harassment tactic of “swatting” — wherein fake bomb threats or hostage situations are phoned in to police […]

What Counts as “Good Faith Sec

The U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. The new guidelines state that prosecutors should avoid charging security researchers who operate in “good faith” when finding and […]

A Haven For Community; Value O1

In today’s Princh Library Blog’s post, guest writer Ugne Lipeikaite, EIFL Public Library Innovation Programme (EIFL-PLIP) Impact Manager, discusses a remarkable Danish public library impact study and asks – can the evaluation approach be applied in developing countries? This article was originally posted on EIFL’s blog. See the original article here. Are you curious what […]