Skip to main content

Trending In Library Management

The History Of Libraries III. 1

Background The age of enlightenment took place in the 17th and 18th century, centering in the heart of Europe. The Enlightenment itself was an intellectual and philosophical movement spreading rapidly throughout the western world, but it was so significant that a whole historical period was characterized by its ideologies. Overtaking the pomp of the renaissance […]

Phish Leads to Breach at Calif1

A phishing attack last week gave attackers access to email and files at the California State Controller’s Office (SCO), an agency responsible for handling more than $100 billion in public funds each year. The phishers had access for more than 24 hours, and sources tell KrebsOnSecurity the intruders used that time to steal Social Security […]

RedTorch Formed from Ashes of 1

Remember Norse Corp., the company behind the interactive “pew-pew” cyber attack map shown in the image below? Norse imploded rather suddenly in 2016 following a series of managerial missteps and funding debacles. Now, the founders of Norse have launched a new company with a somewhat different vision: RedTorch, which for the past two years has […]

Computing Cultural Heritage in1

Olivia Dorsey, Innovation Specialist at the Library of Congress. Olivia is working on Computing Cultural Heritage in the Cloud (CCHC). We’re thrilled to share that Olivia Dorsey recently joined the LC Labs team as an Innovation Specialist! Olivia will be working on the Computing Cultural Heritage in the Cloud (CCHC) initiative at the Library. The […]

Will Libraries Be Relevant In 1

It is no secret that libraries play a vital role in society’s collective growth and educational experience. In recent years, libraries have made huge progress by adapting to the ongoing needs of communities, thus reinforcing their key role and importance. But are they going to stay relevant in the future? How can they continue to […]

Can We Stop Pretending SMS Is 1

SMS text messages were already the weakest link securing just about anything online, mainly because there are tens of thousands of employees at mobile stores who can be tricked or bribed into swapping control over a mobile phone number to someone else. Now we’re learning about an entire ecosystem of companies that anyone could use […]

Channeling the Wisdom of the C1

With the boom of data-driven organizations and the adoption of technological advancements, cybersecurity threats are also getting more sophisticated. The fast-changing nature of cybersecurity and the sheer amount of threats and vulnerabilities requires organizations to stay on top of protecting their assets and data from attackers. To counteract this, organizations are increasingly turning to ethical […]

WeLeakInfo Leaked Customer Pay1

A little over a year ago, the FBI and law enforcement partners overseas seized WeLeakInfo[.]com, a wildly popular service that sold access to more than 12 billion usernames and passwords stolen from thousands of hacked websites. In an ironic turn of events, a lapsed domain registration tied to WeLeakInfo let someone plunder and publish account […]

The Tech Landscape & Libraries

On this week’s Princh Library Blog post we have guest writer Nick Tanzi, author and library technology consultant, sharing his thoughts on the current technological landscape and how libraries can best adapt to it. To say that 2020 was a year of disruption and change would be an understatement. The COVID-19 pandemic has caused pervasive […]

10 Backend Security Risks and 1

And keep in mind, most security risks occur due to misconfigurations, or even the simple lack of scanning. That’s why, in the same way that we recently explored Frontend Security Risks and Best Practices, we’re going to explore some of the most common, yet dangerous, risks within your web application’s backend security. 10 Popular Backend […]

Microsoft Patch Tuesday, March1

On the off chance you were looking for more security to-dos from Microsoft today…the company released software updates to plug more than 82 security flaws in Windows and other supported software. Ten of these earned Microsoft’s “critical” rating, meaning they can be exploited by malware or miscreants with little or no help from users. Top […]

Warning the World of a Ticking1

Globally, hundreds of thousand of organizations running Exchange email servers from Microsoft just got mass-hacked, including at least 30,000 victims in the United States. Each hacked server has been retrofitted with a “web shell” backdoor that gives the bad guys total, remote control, the ability to read all email, and easy access to the victim’s […]

Trojans: Definition, Types and1

On our quest to revisit nearly forgotten, yet still relevant, cyber threats—such as brute force attacks and man-in-the middle attacks—it’s time to dive into trojans. How and why do they still persist? How can organizations protect themselves in the wake of so many new and reinvented campaigns? For a thorough examination, let’s start at the […]

At Least 30,000 U.S. Organizat1

At least 30,000 organizations across the United States — including a significant number of small businesses, towns, cities and local governments — have over the past few days been hacked by an unusually aggressive Chinese cyber espionage unit that’s focused on stealing email from victim organizations, multiple sources tell KrebsOnSecurity. The espionage group is exploiting […]