article thumbnail

Metadata Requirements for Permanent Electronic Records in the Cloud

National Archives Records Express

Metadata are records that need to be managed and retrievable These NARA Bulletins provide further records management guidance for agencies on the topic of metadata and cloud computing: NARA Bulletin 2015-04 : Metadata Guidance for the Transfer of Permanent Electronic Records.

article thumbnail

Ex CIA employee Joshua Adam Schulte sentenced to 40 years in prison

Security Affairs

Furman for crimes of espionage, computer hacking, contempt of Court, making false statements to the FBI, and child pornography.” The hacking tools developed by the US cyber spies can target mobile devices, desktop computers, and IoT devices such as routers and smart TVs. District Judge Jesse M.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

Spamit), an invite-only community for Russian-speaking people in the businesses of sending spam and building botnets of infected computers to relay said spam. From January 2005 to April 2013, there were two primary administrators of the cybercrime forum Spamdot (a.k.a The Spamdot admins went by the nicknames Icamis (a.k.a.

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Ten years ago, then 19-year-old hacker Ngo was a regular on the Vietnamese-language computer hacking forums. Hieu Minh Ngo, in his teens. BEGINNINGS.

article thumbnail

STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

The Last Watchdog

When it comes to securing mobile computing devices, the big challenge businesses have long grappled with is how to protect company assets while at the same time respecting an individual’s privacy. A few months later the United Arab Emirates stood up its National Electronic Security Authority (NESA) which proceeded to do much the same thing.

Security 179
article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

Before the Internet revolution, military-grade electronics were different from consumer-grade. That started to change in the 1980s, when consumer electronics started to become the place where innovation happened. The US nuclear system Barr mentions is one such example -- and it uses ancient computers and 8-inch floppy drives.

Military 101
article thumbnail

Microsoft sued North Korea-linked Thallium group

Security Affairs

The group is charges of violations of the Computer Fraud & Abuse Act and Electronic Communications Privacy Act; federal trademark infringement, dilution, and false designation of origin; cyber squatting; com mon law trespass to chattels; unjust enrichment; conversion; intentional interference with contracts. 27 in the U.S.