Remove Access Remove Case Study Remove Libraries Remove Trends
article thumbnail

1,859 Android and iOS apps were containing hard-coded Amazon AWS credentials

Security Affairs

Researchers from Broadcom Symantec’s Threat Hunter team discovered 1,859 Android and iOS apps containing hard-coded Amazon Web Services (AWS) credentials that allowed access to private cloud services. “Over three-quarters (77%) of the apps contained valid AWS access tokens allowing access to private AWS cloud services.”

Cloud 96
article thumbnail

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

This session was composed of lightning talks about various email archiving projects, including the first NHPRC electronic records case studies focused on email archiving. Katherine O’Neil from the Manuscript Division of Library of Congress described the process of identifying email within their collections. million records.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Recap: A coffee chat with web archivists in US government programs

Archive-It

National Library of Medicine (NLM). Federal Depository Library Program (FDLP). Since then, 213 collections have been developed with the guidance of the Public Policy Statement and can now also be accessed through their catalog. Library of Congress (LoC). Access metrics. Smithsonian Institution Archives.

article thumbnail

Collecting for continuity and for change: The web archiving experience in Westborough

Archive-It

By Anthony Vaver, Local History Librarian and Archivist, Westborough Public Library. Still, I struggled to come up with a reason why someone from our growing South Asian population should visit our public library’s local history room. Local history at our library is accordingly going through a bit of a renaissance.

article thumbnail

Working internationally

CILIP

John Dolan and Ayub Khan have long shared an interest in the international library scene and how different countries and cultures can share and benefit from each other. Our involvement started when we answered a British Council advertisement, in October 2014, for help with reinstating libraries in Lahore and Karachi, Pakistan.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

A backdoor is a trojan that offers an attacker remote access into the victim’s device. If needed, company personnel or law enforcement can use the backdoor to access the system when needed. By obtaining sensitive authentication access, attackers can break into the vendor network or user account. Backdoors.

Phishing 102
article thumbnail

From local to global, NYARC’s networks bring art history to the web archive

Archive-It

The New York Art Resources Consortium (NYARC) has blazed trails into digital art historical collection development and access for more than ten years. Mellon Chief Librarian of The Frick Art Reference Library, mentions in a post on the Library of Congress’ Signal blog , “collaboration has become the watchword for NYARC.