Remove tag personal-information
Remove Education Remove Examples Remove Government Remove Presentation
article thumbnail

Catches of the Month: Phishing Scams for December 2022

IT Governance

Welcome to our December 2022 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over personal data. But I hasten to inform all users that you should not panic. FTX customers offered refund in deepfake phishing scam. Hello everyone. Get started.

Phishing 111
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. Now information technologies and the information revolution are again transforming society. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways. Introduction.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Soccer Field on the Data Center, Chickens in the Parking Lot - in Northern Virginia

Interactive Information Management

Does this concentration of sensitive, valuable information pose a physical, critical infrastructure security threat to my community? Note that this argument applies to any community with significant Data Center facilities investment – though Northern Virginia is a particularly large, influential and quickly-growing example.)

article thumbnail

Thoughts on the Legal Technology Implications of Dynamic Communication Practices

eDiscovery Daily

E-discovery is a prime example of an area where legal technology/operations is seeing the challenges presented by legal professionals’ level of familiarity with computing options, particularly those technologies that form the dynamic changes in how professionals communicate. E-discovery is one example of this.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Lodrina Cherne and Martijn Grooten join the The Hacker Mind podcast to discuss their Black Hat USA 2021 presentation. It says that spy phones sold real time access to that information, which could have enabled domestic abusers and stalkers to track their targets. There are literally dozens of other examples.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

The ability to get information from clouds that are normally thought secure, notably Apple's iCloud, is new for Pegasus. BGR says the price tag for Pegasus is in the range of millions of dollars. BGR says the price tag for Pegasus is in the range of millions of dollars. Government agencies are also targeted.

Cloud 52
article thumbnail

Carl Louis Gregory, Founder of Film Preservation at NARA

Unwritten Record

Before the National Archives held more than half a million reels of film, nearly 200,000 videos, and over 300,000 sound recordings originating from dozens of government agencies (and decades before the existence of the National Archives) Carl Louis Gregory was a motion picture cameraman dedicated to the evolution of the field.