article thumbnail

I Am Parting With My Crypto Library

Schneier on Security

The time has come for me to find a new home for my (paper) cryptography library. My preference is that it goes to an educational institution, but will consider a corporate or personal home if that’s the only option available.

Libraries 143
article thumbnail

Preserving Our Libraries’ Digital Collections is Simple, Powerful, and Affordable

Preservica

Academic libraries are in the midst of rapid, widespread changes as it shifts into the digital age. Our libraries have been a steady flame for patrons to depend on, not just throughout the pandemic, but throughout history. Practical digital preservation training for libraries.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Back-to-School Scams Target Students with Library-Themed Emails

Threatpost

Web Security back to school credential harvesting education cyberattack fake login pages library portals malware MediaGet torrent application downloader Phishing scam Scams student students university portals Win32.Agent.ifdx malware downloader WinLNK.Agent.gen downloaderStudents should keep their eyes peeled for phishing emails purporting to be from their colleges, as well as online student resources laced with malware, researchers warn.

article thumbnail

FritzFrog P2P Botnet is back and targets Healthcare, Education and Government Sectors

Security Affairs

FritzFrog P2P botnet is back and is targeting servers belonging to entities in the healthcare, education, and government sectors. The bot is written in Golang and implements wormable capabilities, experts reported attacks against entities in the government, education, and finance sectors.

article thumbnail

FBI warns of PYSA Ransomware attacks against Education Institutions in US and UK

Security Affairs

The FBI has issued an alert to warn about an increase in PYSA ransomware attacks on education institutions in the US and UK. The FBI has issued Tuesday an alert to warn about an increase in PYSA ransomware attacks against education institutions in the United States and the United Kingdom.

Education 108
article thumbnail

The Big Issue and Library Champion Bobby Seagull bring the case for library funding to Parliament

CILIP

The Big Issue and Library Champion Bobby Seagull bring the case for library funding to Parliament. At a Parliamentary event at the House of Lords today, The Big Issue and Library Champion Bobby Seagull will join forces with CILIP, the UK library association, to make the case for long-term sustainable funding for libraries. Education, informal learning and skills. Chair of the Libraries APPG Gill Furniss commented, ?Libraries Public libraries

article thumbnail

Designing Libraries: Making space for makerspaces

CILIP

Recently I heard a librarian say that introducing makerspaces into libraries was one of the riskiest undertakings the service had ever embarked upon. I found this a little odd, since we are all in the information business and a lot of library time is taken up with answering ?how s library buildings are a mixture of ancient and modern. We increasingly share premises with other services, so sensitivity is always required when we adapt library spaces for new purposes ?

article thumbnail

Finding your way into a library and knowledge career in the health service

CILIP

There are many pre-conceptions about what a career within healthcare libraries will involve. Work within healthcare libraries is a fusion between the type of work that takes place in academic, public and business libraries and information centres.

article thumbnail

State Library of South Australia chooses Preservica to safeguard region?s vibrant story

Preservica

The State Library of South Australia (SLSA) has chosen Preservica’s cloud-hosted active digital preservation platform to safeguard more than 150 terabytes of unique digitized and born-digital material. The State Library of South Australia is the trusted custodian of all South Australiana.

article thumbnail

UK Library Association responds to Boris Johnson?s comments on the Andrew Marr Show

CILIP

UK Library Association responds to Boris Johnson?s s Library and Information Association has responded to comments made by Conservative leader Boris Johnson during his interview with Andrew Marr on Sunday 1st December. I love libraries? Manifesto for Libraries?

article thumbnail

The Fenway Library Organization provides affordable digital preservation to its members

Preservica

Preservica’s Cloud Edition for Consortia delivers value of complete Preservica offering for budget-strapped Academic Libraries. Preservica, the market leader in SaaS-based active digital preservation, is pleased to announce that the Fenway Library Organization (FLO) has selected Preservica’s Cloud Edition for consortia to preserve and safeguard digital content for its members. The libraries will preserve archival materials that are part of the institutional memory.

article thumbnail

?Could do better? ? School Librarians deliver their report card to Education Minister Nick Gibb

CILIP

School Librarians deliver their report card to Education Minister Nick Gibb. School Librarians in England, Wales and Northern Ireland have called on Education Minister, Nick Gibb, to address the findings of new research into School Library provision, which highlights inequality of access to school libraries and insecure employment for school librarians. The research was commissioned by the Great School Libraries campaign ? s School Libraries Group ?

article thumbnail

Dartmouth College Library selects Preservica for long-term digital preservation needs

Preservica

Boston, MA and Oxford, UK – Aug 15 2018 – The Dartmouth College Library, an integral part of the private Ivy League research university in Hanover, New Hampshire, has chosen Preservica ’s cloud-hosted active digital preservation software to protect and provide greater online access to the heritage and institutional assets of the college. The Dartmouth College Library is focused on supporting and enhancing new modes of scholarship and research innovation at Dartmouth.

article thumbnail

With goodwill and a good plan, libraries can deliver

CILIP

With good will and a good plan, libraries can deliver. With good will and a good plan, libraries can deliver. A new advocacy campaign that will build and mobilise national support for libraries has been launched by CILIP in partnership with the EveryLibrary Institute, a US-based project that has helped secure over $1.6bn in tax funding for libraries. Libraries?Deliver Library and Information Professional spoke to him at this year?s

article thumbnail

Scholar Calling on Writers for New Book: Impacts of the Cloud on Records Management and Archives

IG Guru

Barragan (San Jose State University) Introduction “The Library of Babel” is a short story conceiving of a universe in the form of a nearly infinite library containing all possible books. Impacts of the Cloud on Records Management and ArchivesA book edited by Salvador P.

article thumbnail

Quebec shuts down thousands of sites as disclosure of the Log4Shell flaw

Security Affairs

Quebec shut down nearly 4,000 of its sites in response to the discovery of the Log4Shell flaw in the Apache Log4j Java-based logging library. Log4j is an open-source library widely used by both enterprise apps and cloud services, including Apple iCloud and Steam.

Libraries 126
article thumbnail

Security Affairs newsletter Round 266

Security Affairs

Every week the best security articles from Security Affairs free for you in your email box. The post Security Affairs newsletter Round 266 appeared first on Security Affairs. A new round of the weekly SecurityAffairs newsletter arrived!

article thumbnail

ESI, ROT, and LBJ – Thoughts on Data Management While Visiting the Lyndon Johnson Presidential Library: eDiscovery Trends

eDiscovery Daily

A friend met me there, and one of the things we’d hoped to do (besides listen to a lot of live music) was visit the LBJ Presidential Library housed at the University of Texas campus. From the 4th floor mezzanine, you can see the upper floors of the library through glass — Five through Nine contain Johnson’s documents — five floors of paper documents, that may be historically significant and valuable to researchers.

ROT 34
article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. PdfParser, a standalone PHP library, provides various tools to extract data from a PDF file.

article thumbnail

Sky.com servers exposed via misconfiguration

Security Affairs

This is presumably intended to help security researchers vetted by the search engine’s staff to secure the exposed devices and files indexed on the service. The importance of educating support staff on responsible disclosure.

IoT 118
article thumbnail

Researcher published PoC exploit for Ghostscript zero-day

Security Affairs

Security researcher Nguyen The Duc published on GitHub the proof-of-concept exploit code for a Ghostscript zero-day vulnerability. ” wrote the expert that added that his PoC was created only for educational purposes and cannot be used for law violation or personal gain.

Libraries 103
article thumbnail

Cyber espionage campaign targets Asian countries since 2021

Security Affairs

The attackers used Dynamic-link library (DLL) side-loading to deliver the malicious code. The attackers target old and outdated versions of security solutions, graphics software, and web browsers that lack of mitigations for DLL side-loading attacks.

article thumbnail

PYSA ransomware gang is the most active group in November

Security Affairs

Security researchers from NCC Group reported an increase in ransomware attacks in November 2021 over the past month, and PYSA (aka Mespinoza) and Lockbit were the most active ransomware gangs. CERT-FR’s alert states that the Pysa ransomware code is based on public Python libraries.

article thumbnail

The JavaScript Supply Chain Paradox: SRI, CSP and Trust in Third Party Libraries

Troy Hunt

If you look at the source code of this blog you can see it used courtesy of the "integrity" attribute when I embed Report URI JS : <script src="[link] integrity="sha256-Cng8gUe98XCqh5hc8nAM3y5I1iQHBjzOl8X3/iAd4jE=" crossorigin="anonymous"></script> If - for whatever reason - that library is modified upstream of my website, the sha256 hash of the file will be different to the one specified above and the browser simply won't run it.

article thumbnail

Security Should Never Be on Holiday

Thales Cloud Protection & Licensing

As the head of a security company I’m hypersensitive about the security of my personal and company data. I know that in the age of devices we use interchangeably in our work and personal lives that unless everything you are doing is secure, nothing is secure. I also know what it takes to truly secure the sensitive information on my smartphone, tablet and laptop so it doesn’t get in the wrong hands or serve as a trojan horse for a data breach. Data security

Cloud 63
article thumbnail

URLs Aren’t Archives ¯_(?)_/¯, and Other Stories

The Schedule

The expectation of action on the part of institutions such as the Library of Congress was frustrating. Importantly, modern institutional archives do not make it a practice of taking things, or blindly capturing online records, without first attempting to secure the rights to do so. Computers made it possible to digitize that microfilm, secure it in a database, distribute publications even more widely. Outreach and Education Uncategorized journalism

article thumbnail

Chinese Cycldek APT targets Vietnamese Military and Government in sophisticated attacks

Security Affairs

The former collects environment information from the victim machine and sends it to DropBox, the latter runs code to evade detection by security products. ” If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

article thumbnail

What the future holds ? the student view

CILIP

Biddy Casselden shares the key findings from a small survey that she conducted of current postgraduate library students in the UK. The survey asked how postgraduate LIS students felt about the state of the library profession and what they hoped a postgraduate qualification would do for their careers. I am concerned for the future of the library profession across the sectors? The library profession has a positive future.? It makes me fearful for the future of libraries?

article thumbnail

Crooks target Healthcare facilities involved in Coronavirus containment with Ransomware

Security Affairs

” The messages use a weaponized rich text format (RTF) attachment that exploits the CVE-2012-0158 buffer overflow in Microsoft’s ListView / TreeView ActiveX controls in MSCOMCTL.OCX library.

article thumbnail

Librarian Sues Equifax Over 2017 Data Breach, Wins $600

Krebs on Security

“The small claims case was a lot more about raising awareness,” said West, a librarian at the Randolph Technical Career Center who specializes in technology training and frequently conducts talks on privacy and security. “Even if all this does is get people to use better passwords, or go to the library, or to tell a company, ‘No, that’s not not good enough, you need to do better,’ that would be a good thing,” West said.

article thumbnail

Cyber Defense Magazine – April 2019 has arrived. Enjoy it!

Security Affairs

Visit our online library by clicking here. . GARY BERMAN AND HIS TEAM BELIEVE THAT INFOSEC KNOWLEDGE IS POWERFUL – TAKE YOUR AVERAGE EMPLOYEE AND MAKE THEM A CYBER HERO – YOU WILL EMPOWERED THEM AGAINST THE LATEST SPEAR PHISHING ATTACKS AND RANSOMWARE, IN A FUN EDUCATIONAL WAY. White Hat Security Sincerely,TEAM CDMCyber Defense Magazine P.S. Thanks to our awesome sponsors – media kits available here. appeared first on Security Affairs.

article thumbnail

How AI Could Write Our Laws

Schneier on Security

The bill appealed to many privacy-conscious education advocates, and appropriately so. By Nathan E. Sanders & Bruce Schneier Nearly 90% of the multibillion-dollar federal lobbying apparatus in the United States serves corporate interests.

Security 116
article thumbnail

WinRAR CVE-2018-20250 flaw exploited in multiple campaigns

Security Affairs

The flaw is an “Absolute Path Traversal” issue in the library that could be exploited to execute arbitrary code by using a specially-crafted file archive. The issue affects a third-party library, called UNACEV2.DLL that is used by WINRAR, it resides in the way an old third-party library, called UNACEV2.DLL, handles the extraction of files compressed in ACE data format. The post WinRAR CVE-2018-20250 flaw exploited in multiple campaigns appeared first on Security Affairs.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

But how exactly will artificial intelligence help bridge the information security skills gap? And even with the help of machine learning algorithms, what kinds of security work is still best left to humans? The Chrome team, I think there's 38 people just on the security team.

article thumbnail

Annual RSA Conference Exclusive 2019 Edition of Cyber Defense Magazine is arrived

Security Affairs

Setting the Standard in Cyber Training & Education. RSA Conference | Where the world talks security. Visit our online library by clicking here. The post Annual RSA Conference Exclusive 2019 Edition of Cyber Defense Magazine is arrived appeared first on Security Affairs. Breaking News Cyber Crime Hacking cyber defense magazine Cybersecurity Pierluigi Paganini Security Affairs

article thumbnail

Nodersok malware delivery campaign relies on advanced techniques

Security Affairs

About 3% of the infected systems belong to organizations in different sectors, including education, professional services, healthcare, finance, and retail. One of the second-stage instances of PowerShell downloads the legitimate node.exe tool, while another drops WinDivert packet capture library components. The post Nodersok malware delivery campaign relies on advanced techniques appeared first on Security Affairs.

Retail 79
article thumbnail

Snapshot: College and University Retention Schedules

Brandeis Records Manager

Ironically, both library/info services categories and records management records/retention schedule are absent from 72% of the schedules surveyed, indicating that some of us info pros are not “eating our own dog food.” While safety and security record categories appeared underrepresented for such combustible record types (missing from 42% of the schedules), HR/personnel records are covered more consistently in 88% of the schedules. George Despres.

Mining 46
article thumbnail

Decipher Security Podcast With ForAllSecure CEO David Brumley

ForAllSecure

The Decipher Security podcast by Duo Security analyzes the news, explores the impact of the latest risks, and provides informative and educational material for readers intent on understanding how security affects our world. Just like everything in computer security.

IoT 52
article thumbnail

Decipher Security Podcast With ForAllSecure CEO David Brumley

ForAllSecure

The Decipher Security podcast by Duo Security analyzes the news, explores the impact of the latest risks, and provides informative and educational material for readers intent on understanding how security affects our world. Just like everything in computer security.

IoT 52
article thumbnail

DECIPHER SECURITY PODCAST WITH FORALLSECURE CEO DAVID BRUMLEY

ForAllSecure

The Decipher Security podcast by Duo Security analyzes the news, explores the impact of the latest risks, and provides informative and educational material for readers intent on understanding how security affects our world. Just like everything in computer security.

IoT 52