article thumbnail

Missouri Governor Vows to Prosecute St. Louis Post-Dispatch for Reporting Security Vulnerability

Krebs on Security

Louis Post-Dispatch ran a story about how its staff discovered and reported a security vulnerability in a Missouri state education website that exposed the Social Security numbers of 100,000 elementary and secondary teachers. On Wednesday, the St.

article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

Reflecting on the Wannacry ransomware attack, which is the lesson learnt e why most organizations are still ignoring it. In the second phase, once access was gained to a computer, the malware would create and execute a copy of itself on the system.In

IT 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment: eDiscovery Case Law

eDiscovery Daily

At Appellant’s apartment, after the agents discovered a single computer, an HP Envy 700 desktop, which was encrypted with TrueCrypt, Appellant informed the agents that he lived alone, that he was the sole user of the computer, and that only he knew the password to his computer.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. This article looks at encryption, how it fits into cryptology, how cryptographic algorithms work, types, use cases, and more.

article thumbnail

Understanding Blockchain and its Impact on Legal Technology, Part Two

eDiscovery Daily

Now, Tom has written another terrific overview regarding blockchain and legal technology titled Understanding Blockchain and its Impact on Legal Technology that we’re happy to share on the eDiscovery Daily blog. Much speculation centered around the name being based on a setting in the 1996 movie Rising Sun; however, it was believed the true authors were several cryptography and computer science experts of non-Japanese descent. It’s a hacker’s nightmare.

article thumbnail

Despite Estimate of 37 Years to Crack iPhone, Government Doesn’t Have to Return it – Yet: eDiscovery Case Law

eDiscovery Daily

Wolford denied the defendant’s Motion for Return of Property Under Federal Rule of Criminal Procedure 41(g), ruling that “[t]he government’s evidentiary interest in the [defendant’s] iPhone outweighs Defendant’s interest in its return, at least at this stage of the proceedings”.

article thumbnail

Understanding Blockchain and its Impact on Legal Technology, Part Four

eDiscovery Daily

Now, Tom has written another terrific overview regarding blockchain and legal technology titled Understanding Blockchain and its Impact on Legal Technology that we’re happy to share on the eDiscovery Daily blog. And since the decentralized nature of blockchains encourages data sharing, it works better whether the network is local or worldwide. Blockchain eliminates the risks that come with centralized data because it stores data across the network.

article thumbnail

Does Anybody Really Know What Time It Is?: eDiscovery Throwback Thursdays

eDiscovery Daily

So, a workstation displaying the time of an email in Central time would display it as UTC?05:00 So, it’s 7:11 (oh, thank heaven!) Does anybody really know what time it is? OK, it’s an old song by Chicago (back then, they were known as the Chicago Transit Authority). But, the question of what time it really is has a significant effect on how eDiscovery is handled. Why is it a big deal? The post Does Anybody Really Know What Time It Is?:

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. One essential step is developing the DT business case and connecting it with the critical success factors (CSFs) and the product scope. Abstract.

article thumbnail

Uber’s Response to Data Breach? Pay the Hackers to Keep Quiet About It: Cybersecurity Trends

eDiscovery Daily

According to Bloomberg, the breach occurred when two attackers accessed a private GitHub coding site used by Uber software engineers and then used login credentials they obtained there to access data stored on an Amazon Web Services account that handled computing tasks for the company. Travis Kalanick, Uber’s co-founder and former CEO, learned of the hack in November 2016, a month after it took place, the company said. Electronic Discovery Privacy Security

article thumbnail

Social engineering, deception becomes increasingly sophisticated

Security Affairs

Deepfake technology, what’s it? This is done through deep learning methodologies such as the Generative Adversarial Network (GAN) i.e., a group of neural network models for machine learning, deputed to teach computers how to process information by emulating the human brain.

article thumbnail

Attack of drones: airborne cybersecurity nightmare

Security Affairs

Drones currently occupy a unique legal position as they are classified as both aircraft and networked computing devices. Departing from the general market statistics concerning drones, it is prudent to better understand how a flying laptop poses a threat to enterprise operations.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. One essential step is developing the DT business case and connecting it with the critical success factors (CSFs) and the product scope. Abstract.

article thumbnail

Six Charged in Mass Takedown of DDoS-for-Hire Sites

Krebs on Security

Department of Justice (DOJ) today seized four-dozen domains that sold “booter” or “stresser” services — businesses that make it easy and cheap for even non-technical users to launch powerful Distributed Denial of Service (DDoS) attacks designed knock targets offline.

Security 293
article thumbnail

Bridging the Gap between RIM and IT

Positively RIM

Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. For most of us RIMmers, or Info Governors, it is at least as important to be allies with IT. Managing electronic records is arguably more difficult than managing paper. Just as there is often a gap between RIMmers and Legal, there may be an even bigger gulf between RIM and IT. It’s high-quality time.

article thumbnail

List of data breaches and cyber attacks in April 2021 – 1 billion records breached

IT Governance

It was another busy month in the cyber security sector, as we discovered 143 incidents that resulted in 1,098,897,134 breached records. In case you missed it, you may also be interested in our first quarterly review of data breaches and cyber attacks.

article thumbnail

With No Showing of Prejudice, Court Denies Spoliation Sanctions Against Defendant: eDiscovery Case Law

eDiscovery Daily

McCarthy, finding that the plaintiffs “have not demonstrated they have been prejudiced” by the loss of the plaintiff former employee’s work computer, denied the plaintiffs’ motion for sanctions “without prejudice to reassertion of the motion if through discovery it is determined that some specific evidence is beyond Plaintiffs’ reach” for the defendant’s “clear failure” to preserve the computer. Case Law Electronic Discovery Preservation SanctionsIn Mafille v.

article thumbnail

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Six

eDiscovery Daily

Tom has also written several terrific informational overview series for CloudNine, including eDiscovery and the GDPR: Ready or Not, Here it Comes (which we covered as a webcast ), Understanding eDiscovery in Criminal Cases (which we also covered as a webcast ), ALSP – Not Just Your Daddy’s LPO , Why Is TAR Like a Bag of M&M’s? Then came Google with it’s equally fast web-based searching. Does your organization have a plan for preparing for litigation before it happens?

article thumbnail

Fired IT Guy Deleted 23 of His Ex-Employer’s AWS Servers: Cybersecurity Trends

eDiscovery Daily

When it comes to data breaches and other cybersecurity threats, many people discuss the threats from outside hackers. But, it’s the internal employees who can do as much, if not a lot more, damage to an organization’s IT infrastructure. Needham pleaded not guilty to two charges of the Computer Misuse Act – one count of unauthorized access to computer material and one count of unauthorized modification of computer material – but was convicted in January 2019.

article thumbnail

“We’re all mad here”: Google Team Drives

The Schedule

Then it doesn’t matter which way you go,” said the Cat.” I am not in IT and I certainly cannot fathom providing technological solutions to an institution as large, diverse and decentralized as the University of Michigan. Annoyed, my eye twitching a little, I closed my computer and went home for the evening. This is when it hit me. I don’t actually even know if IT knows about the University Archives outside of “old things”.

article thumbnail

Steelcase office furniture giant hit by Ryuk ransomware attack

Security Affairs

Office furniture company Steelcase was hit by Ryuk ransomware attack that forced it to shut down its network to avoid the malware from spreading. It is the largest office furniture manufacturer in the world.

article thumbnail

Court Denies Criminal Defendant’s Motion to Suppress Evidence Obtained via Warrantless Search: eDiscovery Case Law

eDiscovery Daily

The defendant was also subject to the Oregon National Guard’s acceptable use policy and Employees of the Oregon National Guard, including the defendant, were required to sign the policy before they received computer access. Case Law Electronic Discovery Email Privacy

article thumbnail

Friday the 13th is Unlucky for the City of New Orleans. Almost. Maybe.: Cybersecurity Trends

eDiscovery Daily

” As a precautionary measure, the NOLA tweet confirmed, the city’s IT department gave the order for all employees to power down computers and disconnect from Wi-Fi. It isn’t yet known if the two were connected. Electronic Discovery Security

article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. My conclusion is that CTFs are intrinsically an eSport with the attribute of having a strong educational value. Usually it’s grass or some form of terrain where people are playing a game. It can have spectators either on-site or remote using a television. It was during a collective gathering of a StarCraft II tournament in 2011, called BarCraft Montreal.

article thumbnail

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Four

eDiscovery Daily

Craig Ball once made a great point in responding to a post of mine about educating lawyers when he said “ We not only need to persuade lawyers to take the plunge, we need to insure there’s a pool for them to jump into. Do they go to a community night course on computers? Pursue online education? I don’t think I’ve even seen a really good reading list on the topic (and much as I’d like for it to be, consuming the offerings on my web site isn’t enough). ”.

article thumbnail

Security Affairs newsletter Round 293

Security Affairs

Breaking News Hacking hacking news information security news IT Information Security malware Newsletter Pierluigi Paganini Security Affairs Security NewsA new round of the weekly SecurityAffairs newsletter arrived!

article thumbnail

Today is the Day to “Master” Your Knowledge of eDiscovery in Washington DC for 2018: eDiscovery Trends

eDiscovery Daily

It’s here! It’s almost two days of educational sessions covering a wide range of topics! If you’re in the DC area, it’s not too late to attend! This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. It’s about three blocks away from the White House. now is the time to do it.

article thumbnail

Twenty-One Points, Less Than 350 Words: eDiscovery Best Practices

eDiscovery Daily

Leave it to Craig Ball to take a somewhat complex technical concept and break it down to the fewest possible words – i.e., in a “nutshell”. As Craig notes in the latest blog post on his terrific Ball in Your Court blog ( Electronic Storage in a Nutshell ), he finished the E-Discovery Workbook for the 2019 Georgetown E-Discovery Training Academy (which we covered here ). And, you thought that “Cliff” was good at summarizing large amounts of text (think about it).

article thumbnail

My Love for What I Do: eDiscovery Love Story

eDiscovery Daily

It’s Valentine’s Day! Most people know me because of the blog, and you have to love eDiscovery to write about it every day. Yes, it was that long ago. I once wrote an article about CAR systems back in the mid-80s – Computer Assisted (microfilm) Retrieval (good luck finding that article today) – and it seemed like the wave of the future back then. It was really cool – when it worked right. ;o). As Martha Stewart would say, “it’s a good thing.”.

article thumbnail

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

Janik begins his article by referencing the DLA Piper NotPetya ransomware attack in 2017, as follows: “Imagine it’s a usual Tuesday morning, and coffee in hand you stroll into your office. Right inside the door, you see a handwritten notice on a big whiteboard which says: All network services are down, DO NOT turn on your computers! The ABA Opinion discusses three duties under its Model Rules: the duty of competence, the duty of communication, and the duty of confidentiality.

article thumbnail

How should you investigate a data breach?

IT Governance

Several answered with some variation of ‘find out how it happened’. This might seem counterproductive: with so much post-breach chaos, from isolating the incident and letting staff know what’s going on to getting back to work and notifying affected individuals, surely it’s a time to be looking forward, not backward. This might be, for example,the victim’s computer, a web page or a physical space in which documents were compromised. Fortunately, IT Governance is here to help.

article thumbnail

URLs Aren’t Archives ¯_(?)_/¯, and Other Stories

The Schedule

Services such as Archive-It require institutions to make a financial commitment towards server space and the employment of technical archivists to manage institutional collections. Importantly, modern institutional archives do not make it a practice of taking things, or blindly capturing online records, without first attempting to secure the rights to do so. I think it would also behoove us to discuss “vital records” for a moment.

article thumbnail

Web Teleconferencing Solutions Experiencing Challenges During COVID-19 Crisis: eDiscovery Logistics

eDiscovery Daily

Zoom candidly reported that its software has “degraded performance” and its phone service had a “partial outage.” So, there are workarounds; however, I have heard some people have had issues with the computer audio option as well. Electronic Discovery Industry Trends

article thumbnail

Court Orders Defendants to Produce Laptop for Forensic Examination – Again: eDiscovery Case Law

eDiscovery Daily

Kutsomarkos provided pdf versions of documents from the laptop…However, the pdf files scrubbed the metadata from the documents and that metadata should be available on the hard drives…Also, the computer in Garrett was a personal computer, but here the computer was Ms.

article thumbnail

Simon Says – Once, Twice, Three Times a Spoliator: eDiscovery Case Law

eDiscovery Daily

OK, it’s not as catchy as Lionel Ritchie’s hit song , but it’s funny. :o). According to the plaintiff, in February 2016, named defendant ScholarChip told the plaintiff it would have to pay substantially higher fees if it wanted to continue using the software platform it developed. He also saved a copy of his ScholarChip email account on his personal computer. Case Law Electronic Discovery Preservation Sanctions

article thumbnail

Court Declines to Order Plaintiff to Produce Cell Phone in Employment Discrimination Case: eDiscovery Case Law

eDiscovery Daily

21 is broad in scope, requesting production of all Plaintiff’s cell phones for inspection and copying, without any limitation on the data ultimately to be produced from the copy or image of the phone(s)” and observed that “Defendant sets out no protocol or process through which the data it deems responsive would be culled from the copy or image of the phone(s) and any unresponsive and/or privileged data removed or protected.”. Case Law Electronic Discovery Mobile Devices Production

article thumbnail

Florida Appeals Court Upholds Ruling that Non-Party Had No Duty to Preserve Evidence: eDiscovery Case Law

eDiscovery Daily

In the case originally involving the Appellant’s suit against the City of Daytona Beach over zoning, the Appellee was never a party to the Appellant’s action against the City, but the Appellant’s operative complaint contained two references to the Appellee in its general allegations. The Appellee’s deposition was taken in April 2012, where she testified that she had obtained a new desktop computer and had destroyed her old computer in December 2011. Should it be different?

article thumbnail

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Three

eDiscovery Daily

To begin to answer that question, let’s take a look at the ethical obligation that lawyers have to be technically competent and the state of technology education for lawyers today. As one of my good friends in the Louisiana Bar Association pointed out to me when I asked why the LSBA hadn’t produced a specific rule for such a duty, “well we always just assumed it was just part of the general duty of competence. Education. Well, not if law schools have anything to say about it.

article thumbnail

The Sedona Conference Has an Updated Commentary on Rule 45 Subpoenas to Non-Parties: eDiscovery Best Practices

eDiscovery Daily

Last week, The Sedona Conference® (TSC) and its Working Group 1 on Electronic Document Retention & Production (WG1) announced the publication of the Public Comment Version of The Sedona Conference Commentary on Rule 45 Subpoenas to Non-Parties, Second Edition.

article thumbnail

Craig Ball is “That Guy” Who Keeps Us Up to Date on Mobile eDiscovery Trends: eDiscovery Best Practices

eDiscovery Daily

Now, it should be feasible to direct custodians to undertake a simple online preservation process for Android phones having many of the same advantages as the preservation methodology I described for iPhones two years ago. As a result, “examiners may revive the tried-and-true cloning of evidence to clean devices then collecting from the restored device” (just like they once did with computer drives). Electronic Discovery Mobile DevicesSo many topics, so little time (again).