New US Electronic Warfare Platform

Schneier on Security

The Army is developing a new electronic warfare pod capable of being put on drones and on trucks.the Silent Crow pod is now the leading contender for the flying flagship of the Army's rebuilt electronic warfare force. It's hard to tell what this thing can do.

Calculating electronic records storage costs

The Schedule

This post will do the same for electronic records and follows the same formula of not taking into account personnel or overhead costs or depreciation of equipment. Calculating the costs for storing your electronic records on premise will largely depend on the size of your organization.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Keeping up with Quantum Technology | Quantum Computing

Everteam

While everyone is digging deep into the Artificial Intelligence, Machine Learning, Blockchain and many other new digital transformation phenomena, Quantum Computing has been transformed from theory to reality. Let’s move to how it’s related to computers.

RCE flaw in Electronic Arts Origin client exposes gamers to hack

Security Affairs

Electronic Arts (EA) has fixed a security issue in the Windows version of its gaming client Origin that allowed hackers to remotely execute code on an affected computer. Electronic Arts already released a security patch for the remote code execution vulnerability.

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. Tsakalidis said that he had contacted Electron about the vulnerability but that he had gotten no response -- ­and the vulnerability remains.

More Attacks against Computer Automatic Update Systems

Schneier on Security

Last month, Kaspersky discovered that Asus's live update system was infected with malware , an operation it called Operation Shadowhammer. Now we learn that six other companies were targeted in the same operation. As we mentioned before, ASUS was not the only company used by the attackers.

Magecart cybercrime group stole customers’ credit cards from Newegg electronics retailer

Security Affairs

Magecart hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg.

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Schneier on Security

Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. The voter brings a blank ballot to the machine, inserts it into a slot, chooses candidates. Yes, they're computers.

The City of Durham shut down its network after Ryuk Ransomware attack

Security Affairs

The City of Durham, North Carolina, was the last victim in order of time of the infamous Ryuk ransomware that infected its systems. The City of Durham, North Carolina was forced to shut down its network after its systems have been infected with the Ryuk Ransomware during the weekend.

New IRS Site Could Make it Easy for Thieves to Intercept Some Stimulus Payments

Krebs on Security

And earlier today, the IRS unveiled a Web site where it is asking those non-filers to provide their bank account information for direct deposits. Unfortunately, SSN and DOB data is not secret , nor is it hard to come by. The U.S.

IT 215

The Race is On! Crypto Agility vs Quantum Computing. Who is ahead?

Thales eSecurity

Preparing for Data Security in the Quantum Computing Era. Each passing day brings the world closer to the exciting reality of powerful quantum computing. Weather prediction, air traffic control, urban planning, defense strategies, medical research and so much more will be affected by the new era of computing power in ways we can’t even yet predict. Quantum computing is a threat to public key infrastructure and security systems that rely on it.

The Four Phases of CES: I, Consumer, Am Electronic

John Battelle's Searchblog

The post The Four Phases of CES: I, Consumer, Am Electronic appeared first on John Battelle's Search Blog. Call that the first incarnation of CES – literally, electronics for consumers. Stephen Wolfram has even announced a computable database of “connected devices.”

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment: eDiscovery Case Law

eDiscovery Daily

At Appellant’s apartment, after the agents discovered a single computer, an HP Envy 700 desktop, which was encrypted with TrueCrypt, Appellant informed the agents that he lived alone, that he was the sole user of the computer, and that only he knew the password to his computer.

Top 11 EDI (Electronic Data Interchange) Software Solutions

Cllax

In it’s simplest form EDI can be defined as the transfer of structured data, by agreed message standards, from one computer system to another without human intervention. In essence, it. What is EDI?

Supreme Court of Pennsylvania Ruling on Common Law Duty to Protect Electronic Employee Data

Hunton Privacy

The case arose from a data breach in which criminals accessed UPMC’s computer systems and stole the personal and financial information of 62,000 current and former UPMC employees. The court held that: (1) an employer has a duty under Pennsylvania common law to use reasonable care to safeguard its employees’ sensitive personal information that it stores on Internet-accessible computer systems; and (2) Pennsylvania’s economic loss doctrine did not bar the plaintiffs’ negligence claim.

Maryland Court Finds Coverage for Lost Data and Slow Computers After Ransomware Attack

Hunton Privacy

State Auto Property and Casualty Insurance Company , finding coverage for a cyber attack under a non-cyber insurance policy after the insured’s server and networked computer system were damaged as a result of a ransomware attack. This is significant because it demonstrates that insureds can obtain insurance coverage for cyber attacks even if they do not have a specific cyber insurance policy. State Auto denied coverage for the cost of replacing the computer system.

Building the Relationship Between RM and IT

The Texas Record

Whether it’s creating and securing electronic records or establishing a process to capture records from social media sites, records managers often find themselves working closely with their Information Technology (IT) Departments. It was never an adversarial relationship.

Germany makes its cyber capabilities available for NATO alliance

Security Affairs

Germany announced it is going to make its cyber capabilities available for the NATO alliance to help fight hacking and electronic warfare. The post Germany makes its cyber capabilities available for NATO alliance appeared first on Security Affairs.

HHS Releases Guidance on HIPAA and Cloud Computing

Hunton Privacy

Earlier this month, the Department of Health and Human Services’ Office for Civil Rights issued guidance (the “Guidance”) for HIPAA-covered entities that use cloud computing services involving electronic protected health information (“ePHI”). The BAA also must require the CSP to report to the covered entity or business associate whose ePHI it maintains any security incidents of which it becomes aware.

Despite Estimate of 37 Years to Crack iPhone, Government Doesn’t Have to Return it – Yet: eDiscovery Case Law

eDiscovery Daily

Wolford denied the defendant’s Motion for Return of Property Under Federal Rule of Criminal Procedure 41(g), ruling that “[t]he government’s evidentiary interest in the [defendant’s] iPhone outweighs Defendant’s interest in its return, at least at this stage of the proceedings”.

Why Process in eDiscovery? Isn’t it “Review Ready”?: eDiscovery Best Practices

eDiscovery Daily

As Craig explains: “Though all electronically stored information is inherently electronically searchable, computers don’t structure or search all ESI in the same way; so, we must process ESI to normalize it to achieve uniformity for indexing and search.”.

FAQ: How does web archiving fit into records management?

The Texas Record

The benefits are that this practice shows your records management program: is proactive about capturing and preserving its records. has the potential to reconstruct its website if the need arises. Records Management for Blogs, Texts, Social Media, Cloud Computing and more!

Understanding Blockchain and its Impact on Legal Technology, Part Two

eDiscovery Daily

Now, Tom has written another terrific overview regarding blockchain and legal technology titled Understanding Blockchain and its Impact on Legal Technology that we’re happy to share on the eDiscovery Daily blog. It reminds me most of the early days of networking with dumb terminals.

NASA warns of a significant increase in cyber attacks during Coronavirus outbreak

Security Affairs

This week, NASA sent out a memo to its personnel warning of a significant increase in the cyberattacks during the Coronavirus outbreak. According to the Agency, roughly 75 percent of its employees are currently working from home.

Court Rules Fraud Involving a Computer Is Not ‘Computer Fraud’ under Crime Protection Policy

Hunton Privacy

18, 2016), that a crime protection insurance policy does not cover loss resulting from a fraudulent email directing funds to be sent electronically to the imposter’s bank account because the scheme did not constitute “computer fraud” under the policy. Apache then proceeded to make payment to the fraudulent account when it came time to pay Petrofac’s invoices. Apache recouped a portion of the payments from its bank and attempted to recover the balance from its insurer.

EVRAZ operations in North America disrupted by Ryuk ransomware

Security Affairs

Computer systems at EVRAZ, a multinational vertically integrated steel making and mining company, have been hit by Ryuk ransomware. EVRAZ is owned by the popular Russian oligarch Roman Abramovich, it employs more than 1,400 people in the United States and 1,800 in Canada.

Understanding Blockchain and its Impact on Legal Technology, Part Four

eDiscovery Daily

Now, Tom has written another terrific overview regarding blockchain and legal technology titled Understanding Blockchain and its Impact on Legal Technology that we’re happy to share on the eDiscovery Daily blog. Do you understand blockchain and how it can impact the legal profession?

Does Anybody Really Know What Time It Is?: eDiscovery Throwback Thursdays

eDiscovery Daily

So, a workstation displaying the time of an email in Central time would display it as UTC?05:00 So, it’s 7:11 (oh, thank heaven!) Does anybody really know what time it is? OK, it’s an old song by Chicago (back then, they were known as the Chicago Transit Authority).

Cyber Threats Observatory Gets Improvements

Security Affairs

In both ways I am not sure where the sample belong with, so it would be classified as “unknown” and not visualized on this graph. In other words, it could be nice to see what are the patterns used by malware in both: domain names, file names and process names.

Capital One data breach: hacker accessed details of 106M customers before its arrest

Security Affairs

“A former Seattle technology company software engineer was arrested today on a criminal complaint charging computer fraud and abuse for an intrusion on the stored data of Capital One Financial Corporation, announced U.S. Thompson was charged with computer fraud and abuse in U.S.

Is APT27 Abusing COVID-19 To Attack People ?!

Security Affairs

At home it’s hard to have advanced protection systems as we have in companies. For example it’s hard to have Intrusion Prevention Systems, proxies, advanced threat protection, automated sandbox and again advanced end-point protections letting personal devices more vulnerable to be attacked.

Mastering Communication in Cyber Intelligence Activities: A Concise User Guide

Security Affairs

The outbreak and its consequences were predictable and to some extent they were predicted, at least as a non-specific threat. In other words, it’s like the finger pointing to the moon. In this context, it refers to share intelligence and to master communication about intelligence.

Archive-It Partner News, February 2019

Archive-It

by the Archive-It team. Join the Archive-It open call on February 27. The Advanced Training webinar series returns on February 26 with Archive-It as a Reference Tool. Mar 3-6: Electronic Resources & Libraries – Austin, TX. Archive-It Partner News

Microsoft Calls for Legislative Action to Set Rules for Cloud Computing

Hunton Privacy

Microsoft is urging Congress and the information technology industry to act now to ensure that cloud computing is guided by an international commitment to privacy, security and transparency for consumers, businesses and government. Information Security Online Privacy Cloud Computing Computer Fraud and Abuse Act Electronic Communications Privacy Act Microsoft

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

This brings up a pretty interesting issue when it comes to what is or isn’t a record. Retention Note: If the retention period of electronic records is extended to meet requirements of an audit, litigation, Public Information Act request, etc.

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

This brings up a pretty interesting issue when it comes to what is or isn’t a record. Retention Note: If the retention period of electronic records is extended to meet requirements of an audit, litigation, Public Information Act request, etc.

Meet new Archive-It and Web Group teammates

Archive-It

by the Archive-It team. Archive-It and the Internet Archive’s Web Group welcomed three new teammates this fall. They have already contributed important updates and improvements to the web crawling, data service, and archival replay tools relied upon by Archive-It partners.

How Did We Get Here? Five Technologies that led to electronic records

Positively RIM

The RIM world still wrestles with the progression of paper records into electronic records, as well as the integration of the two. To successfully address these issues, it helps to know the back-story. It’s not surprising that records management borrowed heavily from Library Science. When the technology raised its capacity and lowered its costs, digital storage of images became practical. Computer power.

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Six

eDiscovery Daily

Now, Tom has written another terrific overview regarding pre-litigation considerations titled Preparing for Litigation Before it Happens that we’re happy to share on the eDiscovery Daily blog. Then came Google with it’s equally fast web-based searching.

This is the old ChiefTech blog.: The Circle of Computing Life

ChiefTech

Sunday, 1 July 2007 The Circle of Computing Life I came across a great book a few weekends ago, called A Computer Called LEO , that tells the story of the first computer to be used by business. Its a particularly unusual story, because the idea for the computer in question emerged in the first half of the last century on the back of early management thinking (particularly scientific management) and the needs of Joseph Lyons and Co.