Remove 09
article thumbnail

North Korea-linked Kimsuky used a new Linux backdoor in recent attacks

Security Affairs

Kimsuky cyberespionage group (aka Springtail, ARCHIPELAGO, Black Banshee, Thallium , Velvet Chollima, APT43 ) was first spotted by Kaspersky researcher in 2013. Troll Stealer can also copy the GPKI (Government Public Key Infrastructure) folder on infected computers. WIZVERA VeraPort is used to digitally sign and verify downloads.

article thumbnail

FAQ: Are text messages records? (redux)

The Texas Record

In that time, the popularity of text messaging (“texting”) has skyrocketed while awareness that text messages (“texts”) are potentially government records has increased very little. The definition of a government record in Texas is media neutral. Believe it or not, you can conduct government business via text message.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DOS and DON’TS of a 30(b)(6) Witness Deposition, Part Five

eDiscovery Daily

Depositions of government agencies are explicitly permitted under Rule 30(b)(6), but if the agency happens to be serving as trial counsel in an enforcement action and also conducted or supervised the underlying investigation, many courts refuse to permit the deposition. 8:09-cv-455-T-23TBM (M.D. 2d 1171 (2013). Merkin, Case No.

article thumbnail

Information Architecture – “the battery in the toy”

CGI

Tue, 10/29/2013 - 09:00. If you want to develop an effective IM solution it is critical you understand what information your organisation needs, the role it plays in supporting activity, the way it flows through the organisation, how it is used and how its use needs to be governed. ravi.kumarv@cgi.com. You know the scene.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

19 No longer are the proportionality considerations described as separate “limitations” on an inquiry governed solely by relevance.20 Reducing such exposure is one of the primary reasons that companies implement such policies as part of their information governance programs. 12-2515, 2013 WL 3974535, at *2 (E.D. Strauss , No.

Privacy 97