Case Study: LEGIT_00004


LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

IT 52

Today We are Launching a new Series of Information Governance Case Studies


We are pleased to bring the IGI community another series of case studies about how professionals like you are tackling IG. In 2016, we worked with IG Charter Supporter, OpenText, to create the first series of Snapshots, which is now among our most widely-read publications. IG Snapshots are compact case studies drawn from IGI’s interviews and discussions with our community of IG practitioners.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

FTC Releases Summary of Workshop on Privacy Disclosures

Hunton Privacy

On November 30, 2016, the FTC released a staff summary (the “Summary”) of a public workshop called Putting Disclosures to the Test. The workshop, which was held on September 15, 2016, examined ways of testing and evaluating company disclosures regarding advertising claims and privacy practices. The workshop covered disclosure effectiveness, case studies and future approaches, and applications to disclosure design.

Building long-term transformational outsourcing relationships: An insurance success story


What began as an initial five-year outsourcing contract in 2005 turned into an extended contract that finally concluded in January 2016—with expected benefits delivered and high client satisfaction scores achieved. Also, I invite you to read our Delta Lloyd case study to learn more. . Building long-term transformational outsourcing relationships: An insurance success story. Anonymous. Thu, 09/08/2016 - 02:38.

Archiving the Web @EBRPL: Creating and following a web collecting policy in a public library


During the summer of 2016, Baton Rouge witnessed the shooting of Alton Sterling , the mass shooting of Baton Rouge law enforcement , and the Great Flood of 2016. Amateur drone footage collected for the South Louisiana Flood of 2016 Collection.

From local to global, NYARC’s networks bring art history to the web archive


In this case, why are three heads better than one? February 2016 capture of the now closed Laurel Gitlen art gallery on Manhattan’s Lower East Side. Case Studies Collaborative Collecting Learn more about web archiving Museums and Art Librariesby Karl-Rainer Blumenthal.

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials


In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the course of March, 2016–March, 2017, we identify 788,000 potential victims of off-theshelf keyloggers; 12.4 Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account.

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

“In a case study on its website, Trend Micro lists Mitsubishi Electric as one of the companies that run the OfficeScan suite.” Chinese hackers have exploited a zero-day vulnerability the Trend Micro OfficeScan antivirus in the recently disclosed hack of Mitsubishi Electric.

A straightforward and pragmatic guide to leadership, management and teamwork


This book translates theories in teamwork, management and leadership into practical guidance backed up with examples and case studies from current library and information workers globally. A straightforward and pragmatic guide to leadership, management and teamwork.

Poster boy for Information Governance


Years ago, while teaching a course to MBA students at Rice University, I used the Target credit card breach as a case study. Certainly an argument for an Information Governance case study of just the Clinton email investigation and its aftermath. It touched a lot of bases. Now we have a better one.

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk. Members gain access to third-party IT security risk management best practices via case studies, surveys, whitepapers, webinars, meetings and conferences. Last year’s study, which looked at 2017 data, showed steady, incremental year-over-year gains, painting an overall encouraging picture.

Risk 121

4 ways ISO 27001 can enhance your business

IT Governance

In the UK, the number of organisations certified to the Standard increased by 20% in 2016 , bringing the total to more than 33,000. You’ll learn how to implement ISO 27001 in nine steps and have the opportunity to get involved in group discussions, practical exercises and case studies.

Sales 58

Holocaust Memorial Day: learning from the past for a better future


In 2016, a study into the impact of HMD carried out by Sheffield Hallam University found that 70 per cent of respondents who had taken part in an HMD activity became more aware of the causes and conditions that can lead to genocide.

Resourceful Records Managers! Courtney Bailey, Chair, SAA Records Management Section 2019-2020

The Schedule

Whenever I had the opportunity to focus my own research, I tried to focus on a topic that would fill in a gap for me, and in this case, I looked into records management in the business arena. When I attended the SAA annual meeting in 2016, I learned about the work Mike Strom had done in Wyoming, so I later followed up with him to discover more information about their development and implementation processes.

Archive-It Partner News, November 2017


Results and observations from the three previous surveys ( 2011 , 2013 , 2016 ) are available. To explore a rich case study in collecting and parsing out this information, see the new blog post by partners at the U.S. by the Archive-It team. Community News.