article thumbnail

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. The vulnerability is not part of the applications themselves but of the underlying Electron framework -- ­and that vulnerability allows malicious activities to be hidden within processes that appear to be benign.

article thumbnail

Whee! What a Great Event at the Second Annual WiE Legal Technology Showcase and Conference: eDiscovery Trends

eDiscovery Daily

As I noted yesterday , the Women in eDiscovery (WiE), Houston Chapter, in partnership with South Texas College of Law and the Association of Certified E-Discovery Specialists (ACEDS), hosted the second annual “Legal Technology Showcase & Conference” yesterday. Both events were at South Texas College of Law in downtown Houston.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“Master” Your Knowledge of eDiscovery With This Conference in Washington DC Again This Year: eDiscovery Trends

eDiscovery Daily

And, it’s time for another The Master’s Conference DC event! The Master’s Conference brings together leading experts and professionals from law firms, corporations and the bench to develop strategies, practices and resources for managing eDiscovery and the information life cycle. Click here to register for the conference.

article thumbnail

Today is the Day to “Master” Your Knowledge of eDiscovery in Washington DC for 2018: eDiscovery Trends

eDiscovery Daily

Today is the start of the The Master’s Conference DC event! The Master’s Conference brings together leading experts and professionals from law firms, corporations and the bench to develop strategies, practices and resources for managing eDiscovery and the information life cycle. Click here to register for the conference.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. So would the FBI breaking into my home and seizing my personal electronics. Transferring files electronically is what encryption is for.

article thumbnail

German DPAs Address a Wide Range of Topics at Annual Conference and Adopt Resolutions

Hunton Privacy

On October 2, 2013, the 86th Conference of the German Data Protection Commissioners concluded in Bremen. securing electronic communications by implementing and developing end-to-end encryption. securing electronic communications by implementing and developing end-to-end encryption.

article thumbnail

Web Teleconferencing Solutions Experiencing Challenges During COVID-19 Crisis: eDiscovery Logistics

eDiscovery Daily

CloudNine uses RingCentral (which is built on Zoom) and I have noticed a couple of issues dialing into meetings this week, but was able to circumvent them by using computer audio instead. So, there are workarounds; however, I have heard some people have had issues with the computer audio option as well. Stay healthy out there!