Skip to main content

Trending In Library Management

Library of Congress Digital Co1

Library of Congress Digital Collections Strategy Published

The following is co-authored with Joe Puccio, the Library of Congress Collection Development Officer. Digital collections, and the work related to their acquisition, preservation and access, have become increasingly central to Library of Congress processes and our mission to serve Congress and the nation. For the last five years, in accordance with the Library of […]

Inside Ireland’s Public Health

The consulting firm PricewaterhouseCoopers recently published lessons learned from the disruptive and costly ransomware attack in May 2021 on Ireland’s public health system. The unusually candid post-mortem found that nearly two months elapsed between the initial intrusion and the launching of the ransomware. It also found affected hospitals had tens of thousands of outdated Windows […]

Stanford Libraries welcomes La1

I am delighted and excited to announce that Lauren Sorensen is joining Stanford Libraries as a new staff member of Digital Library Systems and Services. Lauren’s first day will be Tuesday, January 18, 2022. It’s auspicious to make this announcement today, Human Rights Day, as Lauren will be serving as the Digital Projects and Data […]

Information Professionals Can 1

Who does “library professionals” refer to? What do they do, and how are they helpful for their communities? And why do they wear so many hats? Guest writer and Information Professional Ania Matuszewska shares her thoughts in this week’s Princh Library Blog post! The Mad Hatter by John Tenniel (1865) ‘Ipsa scientia potestas est.’ Among […]

Canada Charges Its “Most Proli

A 31-year-old Canadian man has been arrested and charged with fraud in connection with numerous ransomware attacks against businesses, government agencies and private citizens throughout Canada and the United States. Canadian authorities describe him as “the most prolific cybercriminal we’ve identified in Canada,” but so far they’ve released few other details about the investigation or […]

Annotation as Aesthetic: A Clo1

2021 Innovator in Residence Courtney McClellan created Speculative Annotation, an experimental browser-based application that encourages students and teachers to have conversations with historic Library of Congress items through annotation and mark-making. McClellan is a research-based artist who lives in Atlanta, Georgia. With a subject focus on speech and civic engagement, McClellan works in a range […]

3D scans support students work1

A pair of wooden sandals carved and worn by Songye people in what is now the Democratic Republic of the Congo, early to mid-20th century (Object IDs 84.599A and 84.599B). Once again the Digital Production Group (DPG) is partnering with the Stanford University Archaeology Collections (SUAC) team to bring 3D scanning technology into the classroom to […]

Who Is the Network Access Brok1

Rarely do cybercriminal gangs that deploy ransomware gain the initial access to the target themselves. More commonly, that access is purchased from a cybercriminal broker who specializes in acquiring remote access credentials — such as usernames and passwords needed to remotely connect to the target’s network. In this post we’ll look at the clues left […]

Ubiquiti Developer Charged Wit1

In January 2021, technology vendor Ubiquiti Inc. [NYSE:UI] disclosed that a breach at a third party cloud provider had exposed customer account credentials. In March, a Ubiquiti employee warned that the company had drastically understated the scope of the incident, and that the third-party cloud provider claim was a fabrication. On Wednesday, a former Ubiquiti […]

Protect Your Library From Keyl1

Public libraries provide access to technology to many visitors through shared devices. However, there are people looking to exploit these services through stealing sensitive personal information of other visitors, often through the practice of keylogging. But what exactly is keylogging? Is it a relevant threat to all libraries? How can you prevent it? Read this […]

Put to the Test

Kathy McFadden (right), a staffer at Sussex County (Del.) Libraries, hands out rapid, at-home COVID-19 testing kits during a drive-through distribution event at Seaford (Del.) District Library in August 2021. Photo: Delaware Department of Libraries Since the onset of the coronavirus pandemic, libraries have served both informally and officially as public health partners, from 3D-printing […]

The Internet is Held Together 1

A visualization of the Internet made using network routing data. Image: Barrett Lyon, opte.org. Imagine being able to disconnect or redirect Internet traffic destined for some of the world’s biggest companies — just by spoofing an email. This is the nature of a threat vector recently removed by a Fortune 500 firm that operates one […]

It’s a bird, it’s a plane, it’

Before I joined LC Labs, I was an English teacher. In my classroom, the word “derivative” had a negative connotation. To be derivative was to be overly indebted to another idea and thus to lack ingenuity and creativity. When applied to datasets, however, “derivatives” abound. In fact, as you’ll see, derivative datasets sometimes serve a […]

Arrest in ‘Ransom Your Employe

In August, KrebsOnSecurity warned that scammers were contacting people and asking them to unleash ransomware inside their employer’s network, in exchange for a percentage of any ransom amount paid by the victim company. This week, authorities in Nigeria arrested a suspect in connection with the scheme — a young man who said he was trying […]

Reflecting On a Year of Select1

Introduction The Selected Datasets Collection was publicly launched June 2020 as part of the Library’s ongoing efforts to support emerging data-driven styles of research. Since then, our initial offering of twenty datasets has grown to nearly 200 unique items, and we’ve continued to refine the technical workflows by which content is prepared and delivered to […]

The ‘Zelle Fraud’ Scam: How it

One of the more common ways cybercriminals cash out access to bank accounts involves draining the victim’s funds via Zelle, a “peer-to-peer” (P2P) payment service used by many financial institutions that allows customers to quickly send cash to friends and family. Naturally, a great deal of phishing schemes that precede these bank account takeovers begin […]

‘By the People’ Turns 3: A Yea

It’s that time again: another By the People anniversary! To celebrate the third birthday of crowd.loc.gov, we thought we would share some highlights from this past year. Interested in our previous anniversary posts? Check out our Year 1 and Year 2 celebrations on the Signal. As a quick recap, By the People (BtP) is a volunteer engagement and collection enhancement program at the Library of Congress that […]