article thumbnail

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. From a news article : At the BSides LV security conference on Tuesday, Pavel Tsakalidis demonstrated a tool he created called BEEMKA , a Python-based tool that allows someone to unpack Electron ASAR archive files and inject new code into Electron's JavaScript libraries and built-in Chrome browser extensions.

article thumbnail

Keeping up with Quantum Technology | Quantum Computing

Everteam

While everyone is digging deep into the Artificial Intelligence, Machine Learning, Blockchain and many other new digital transformation phenomena, Quantum Computing has been transformed from theory to reality. Listed under one of the ten strategic technology trends for 2019 according to Gartner, Quantum Computing has been grabbing the headlines. Let’s move to how it’s related to computers. What is Quantum Computing? Quantum Computing quantum computing

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. Capture the Flag events, a collective obsession. In the hacking communities, CTF events have always been the practitioner’s favorite. These kinds of events have existed for quite a very long time now, with my first personal participation being around 2002. This is true in gaming, and especially true in CTF events.

article thumbnail

The Four Phases of CES: I, Consumer, Am Electronic

John Battelle's Searchblog

The post The Four Phases of CES: I, Consumer, Am Electronic appeared first on John Battelle's Search Blog. CES is a huge event, one that almost everybody in our industry has been to at least once, if not multiple times. Call that the first incarnation of CES – literally, electronics for consumers. But starting in the mid to late 1908s, a brash new industry was starting to take over the “buzz” on the show floor – personal computers.

article thumbnail

Supreme Court of Pennsylvania Ruling on Common Law Duty to Protect Electronic Employee Data

Hunton Privacy

The case arose from a data breach in which criminals accessed UPMC’s computer systems and stole the personal and financial information of 62,000 current and former UPMC employees. The plaintiffs alleged that UPMC was negligent in the collection and storage of this information, and breached an implied contract in connection with the event.

article thumbnail

Whee! What a Great Event at the Second Annual WiE Legal Technology Showcase and Conference: eDiscovery Trends

eDiscovery Daily

Both events were at South Texas College of Law in downtown Houston. The event was a huge success, with a reported total of 239 attendees (considerably more than last year’s inaugural event). After two years, it may be safe to say that this annual event has already become the most significant eDiscovery conference in the Houston area! We look forward to next year’s event! If so, you absolutely have to attend next year’s event!

article thumbnail

Modern Data Discussions by Leading Experts at The Master’s Conference in DC

eDiscovery Daily

Last week, CloudNine Senior Director Rick Clark , VP Rob Lekowski and industry thought leaders convened in Washington, DC for The Master’s Conference first in-person event since early 2020. Missed the Washington, DC event?

article thumbnail

FAQ: How does web archiving fit into records management?

The Texas Record

Last but not least, think about how the ease of access to your records, their security and management, and your service contract could be affected if your web archiving provider experiences an event that threatens its systems or if it joins forces with another company.

article thumbnail

What is Information Capture? Definition, Purpose, and Value

AIIM

Records must be trustworthy, reliable, and authentic and a key consideration for that is to capture the record in its context as close to the event it documents as possible. Whether paper or electronic, records are often created and related to other records - for example, all personnel files.

article thumbnail

How to Maintain eDiscovery Data Integrity

eDiscovery Daily

As a vital part of the Electronic Discovery Reference Model (EDRM) , any data collected is done so with the intent to capture it exactly as intended or as it was actively being used. Backup Your Data: Regularly scheduled and reliable data backups are essential in the event of data loss. .

article thumbnail

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Krebs on Security

But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing.

article thumbnail

Podcast Episode 128: Do Security and Privacy have a Booth at CES?

The Security Ledger

In this episode of The Security Ledger podcast (#128): you're going to hear a lot from the annual Consumer Electronics Show (CES) out in Las Vegas this week, but are any of the new gadgets being released secure? And do security and privacy have a seat at the table at the world's largest electronics event? And do security and privacy have a seat at the table at the world’s largest electronics event?

article thumbnail

Today is the Day to “Master” Your Knowledge of eDiscovery in Washington DC for 2018: eDiscovery Trends

eDiscovery Daily

Today is the start of the The Master’s Conference DC event! This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. GDPR, blockchain and big data are also significant topics for the event. The event is being held today and tomorrow at Sidley Austin LLP , 1501 K Street, N.W. Click here for more information on remaining scheduled events for the year.

article thumbnail

Web Teleconferencing Solutions Experiencing Challenges During COVID-19 Crisis: eDiscovery Logistics

eDiscovery Daily

CloudNine uses RingCentral (which is built on Zoom) and I have noticed a couple of issues dialing into meetings this week, but was able to circumvent them by using computer audio instead. Electronic Discovery Industry Trends

article thumbnail

An Early Recap of Privacy in 2020: A US Perspective

Data Matters

The CJEU did not so much as ask whether any EU member state has an oversight body to examine and judge the privacy or civil rights implications of electronic surveillance the way PCLOB and Foreign Intelligence Surveillance Court do — with full national security clearance to access the deepest secrets of signals intelligence. communications service providers to produce the contents of electronic communications they store outside the United States in response to U.S.

article thumbnail

Why Are Businesses Opting for Edge, AI, and IoT – and Are They Wise to Do So?

ARMA International

Edge computing is increasingly associated with at least two “trending” terms in the IT and information arenas: Internet of Things (IoT) and artificial intelligence (AI). Broadly speaking, the term refers to computing that’s done at or near the source of the data. These great distances can result in delays in computing, which can impact an organization’s capacity to optimally analyze and leverage its data.

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

This post summarizes the practical measures that may be adopted to protect your firm against cyberattacks and the keys to successful crisis management in the event that an unauthorized data breach occurs. In this year’s report, “technological vulnerabilities” are cited as among the top five global risks, alongside key environmental and societal risks, such as “extreme weather events” and “weapons of mass destruction.”.

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

This post summarizes the practical measures that may be adopted to protect your firm against cyberattacks and the keys to successful crisis management in the event that an unauthorized data breach occurs. In this year’s report, “technological vulnerabilities” are cited as among the top five global risks, alongside key environmental and societal risks, such as “extreme weather events” and “weapons of mass destruction.”.

article thumbnail

EU: NIS2 enters into force

DLA Piper Privacy Matters

Generally, essential and important entities will fall under the jurisdiction of the Member State in which they are established, or, in the case of providers of public electronic communications networks or services, the jurisdiction of the Member State where they provide the services.

Privacy 52
article thumbnail

CloudNine Announces Acquisition of ESI Analyst

eDiscovery Daily

HOUSTON, TX – August 25, 2021 – Today, eDiscovery technology leader CloudNine announced the acquisition of ESI Analyst , the emerging standard for modern file types such as mobile, chat, social media, text, computer activity, financial data, and more. Electronic Discovery News eDiscovery SoftwareeDiscovery industry standard for processing traditional data types acquires leader of emerging standard for modern data discovery to integrate platforms and enhance customer value.

article thumbnail

Twenty-One Points, Less Than 350 Words: eDiscovery Best Practices

eDiscovery Daily

As Craig notes in the latest blog post on his terrific Ball in Your Court blog ( Electronic Storage in a Nutshell ), he finished the E-Discovery Workbook for the 2019 Georgetown E-Discovery Training Academy (which we covered here ). In between are concepts about things like storage media, how computers store data, how file types and file formats are identified, different types of metadata, what happens to files when they’re deleted and how they can be recovered, and so forth.

article thumbnail

“Master” Your Knowledge of eDiscovery With This Conference in Washington DC Again This Year: eDiscovery Trends

eDiscovery Daily

And, it’s time for another The Master’s Conference DC event! This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. GDPR, blockchain and big data are also significant topics for the event. The event will be held on Tuesday, October 23 and Wednesday, October 24 at Sidley Austin LLP , 1501 K Street, N.W. It’s October!

article thumbnail

Spotlight Podcast: At 15 Cybersecurity Awareness Month Grows with Cyber Risk

The Security Ledger

Russ Schrader of the National Cybersecurity Alliance (NCSA) and Angel Grant of RSA * join us to discuss the history of Cybersecurity Awareness Month and how the event is changing to meet growing demand. . The Computers in our Pockets. Problems like cyber crime were predictable outgrowths of growing connectivity and convenience – from electronic banking to online retail, Angel Grant of RSA told me.

article thumbnail

Strategies to Protect your Records from Ransomware

The Texas Record

Backup your information: Your data should be backed up in multiple locations, primarily in locations where it is not constantly connected to the computer or network. These viruses attack electronic records in various forms such as Word Document, email, Excel Spreadsheet, etc. The security of electronic records is a joint responsibility of RM and IT. Let us know what successes or challenges you are having in the protection of your electronic records in the comments below.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Court Upholds Decision Not to Compel Plaintiff to Produce Unredacted Narrative of Events : In Kratz v. Case Law Electronic Discovery

article thumbnail

Regulating Privacy Across Borders in the Digital Age

Hunton Privacy

The high-profile speakers explored various privacy issues that have raised regulatory concerns around the world, including issues on behavioral advertising, cloud computing and data breaches. In addition, they further discussed the revisions proposed in the EU Directive on Privacy and Electronic Communications.

article thumbnail

No Bad Faith Means No Sanctions for Failing to Preserve Video of Altercation: eDiscovery Case Law

eDiscovery Daily

On July 3, 2018, plaintiff tendered a document request for, among other things, “surveillance footage, recordings or other video…that refer or relate to any events alleged in Plaintiff’s Complaint.” In assessing the plaintiff’s motion, Judge O’Hara noted that “the parties agreed the surveillance video is a form of electronically stored information (“ESI”) subject to the preservation requirements of Rule 37(e)”. Case Law Electronic Discovery Preservation Sanctions

article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

In the early afternoon of Friday 12 May 2017, the media broke the news of a global computer security attack carried out through a malicious code capable of encrypting data residing in information systems and demanding a ransom in cryptocurrency to restore them, the Wannacry ransomware.

article thumbnail

e-Records Sustainability and Emerging Formats – 3 Tips from Andy Warhol

Preservica

As part of this year’s event, CoSA released an infographic on emerging electronic formats. It is a timely reminder that the environments where electronic records are created, captured and managed are complex and dynamic and thus require monitoring and evolving preservation practices.

article thumbnail

Hewlett-Packard/Autonomy Deal Results in More Indictments: eDiscovery Trends

eDiscovery Daily

as it “targets a British citizen with rehashed allegations about a British company regarding events that occurred in Britain a decade ago.” which was formed in the breakup of HP’s corporate computing divisions from its printer and PC business in 2015) praised the indictment. “HPE Electronic Discovery Ethics Industry Trends

article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

Malware, a combination of the terms ‘malicious’ and ‘software,’ includes all malicious programs that intend to exploit computer devices or entire network infrastructures to extract victim’s data, disrupt business operations, or simply, cause chaos. There’s no definitive method or technique that defines malware; any program that harms the computer or system owners and benefits the perpetrators is malware. Computer Viruses. Computer worms.

article thumbnail

Plaintiff is Able to Get Some Subpoenas for Personal Data Quashed, But Not All: eDiscovery Case Law

eDiscovery Daily

After the plaintiff left the vessel, defendants located a computer file supposedly created by the plaintiff, containing text messages, emails, and photographs dated October 2013 to July 2014 that seemed to reflect drug transactions and a volatile relationship, but the plaintiff (in his deposition) denied fighting with his girlfriend and denied punching through the wheelhouse window. Case Law Electronic Discovery Mobile Devices ProportionalityIn Delgado v. Tarabochia, et al.,

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Ten years ago, then 19-year-old hacker Ngo was a regular on the Vietnamese-language computer hacking forums.

Security 266
article thumbnail

Relativity Fest is Here! And So Are We!: eDiscovery Trends

eDiscovery Daily

Actually, it started yesterday, with a few events, including the Welcome Reception and the Beer and Basics: e-Discovery 101 and Relativity Fundamentals session (serving beer and wine at an education session is OK with me!). United States to the passage of the California Consumer Privacy Act of 2018 to the European Union’s passage of the General Data Protection Regulation (GDPR), 2018 has been an eventful year in the law of data privacy and data protection.

article thumbnail

Delaware County, Pennsylvania, opted to pay 500K ransom to DoppelPaymer gang

Security Affairs

“The County of Delaware recently discovered a disruption to portions of its computer network. We commenced an immediate investigation that included taking certain systems offline and working with computer forensic specialists to determine the nature and scope of the event.

article thumbnail

Off the Record: Ransomware Threats and RM Modernization, Apple Promotes Access and Washington Denies Access

The Texas Record

The city of Atlanta was recently hit with a hacking attack that took control of much of the city’s computer network and this type of event is not a one off. Links Access Cartoon electronic records ERMS Health Information Humor Off the Record Open Records Public Records RIM MonthTune in monthly for a curated collection of articles we found interesting on a broad range of topics; some which are directly related to records management and others which might share common themes.

article thumbnail

Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M

Krebs on Security

The email allowed the intruders to install malware on the victim’s PC and to compromise a second computer at the bank that had access to the STAR Network , a system run by financial industry giant First Data that the bank uses to handle debit card transactions for customers. That second computer had the ability to manage National Bank customer accounts and their use of ATMs and bank cards.

Security 155
article thumbnail

STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

The Last Watchdog

When it comes to securing mobile computing devices, the big challenge businesses have long grappled with is how to protect company assets while at the same time respecting an individual’s privacy.

MDM 156
article thumbnail

Best Encryption Software for 2022

eSecurity Planet

Encryption technology has evolved over the years to cover data in use, and the emerging power of quantum computing has given rise to quantum cryptography. The advent of quantum computing has given them far more juice to crack traditional encryption methods.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Since the inception of data forensics almost forty years ago, methods for investigating security events have given way to a market of vendors and tools offering digital forensics software (DFS). image files, and analysis of remote computers.