Wednesday, February 19, 2020
Home 2018 July

Monthly Archives: July 2018

Report shows increase in social engineering

 Emma Bordessa  13th July 2018 Proofpoint’s The Human Factor 2018 Report revealed that over the past year, cyber criminals have continued to increase their use of social...

ICRM Partners with LIU Post Palmer School of Library and Information Science

July 23, 2018 The Institute of Certified Records Managers (ICRM) and the LIU Post Palmer School of Library and Information Science, announce a strategic partnership...

16 popular VPNs leak your data: Here’s the full list

VPNs are becoming increasingly popular due to data privacy concerns, but a new report found that some aren't effective.

ARMA announces this year’s keynote speaker, Dr. Jennifer Golbeck, Ph.D.

ARMA is pleased to announce this year’s keynote speaker, Dr. Jennifer Golbeck, Ph.D. Jennifer is the Director of the Social Intelligence Lab at the University...

Review: A Counterfeit, $100 iPhone X

We disassembled the phone and asked security researchers to probe it to find out what it is. Verdict: It's wild.

Three Fundamental Digital Preservation Strategies

July 9, 2018 by Margot Note, CA, CRM Digital files exist simply as data until they are rendered by application software, operating systems, and hardware...

SAA Statement on Presidential Records

June 22, 2018—The Society of American Archivists is deeply concerned about a recent report of the alleged ongoing destruction of presidential records by President Donald Trump, in...

Goodman of ARMA’s Board Sees New California Privacy Act as ‘De Facto’ National Law

July 16, 2018 California's new Consumer Privacy Act of 2018 is likely to be treated as a de facto nationwide requirement, says information privacy expert Susan Goodman, a member...

The Information Governance Conference Announces 2018 Keynote Speaker

Drones and related technologies continue to tangle up courtrooms - with implications on downstream information, autonomous vehicles, manufacturing, healthcare, and so much more. That's why we're...

A Review: Infonomics

Infonomics, by Douglas B. Laney at Gartner, Inc. is a book on how to monetize, manager, and measure information as an asset for competitive...

Preparing your RIM program for the 2020’s

unsplash-logoSamuel Zeller By Andrew Ysasi, FIP, CIPM, CIPP, CISM, PMP, CRM, IGP July 18, 2018 Records and Information Management (RIM) has seemingly been pushed aside for loftier...

Federal Legislation Could Open New Doors for State, Local Bug Programs

State and local agencies have yet to fully embrace bug bounty programs, but a bill introduced last month may provide an introduction to bug bounty programs.

Inside China’s Dystopian Dreams: A.I., Shame and Lots of Cameras

By Paul Mozur July 8, 2018 ZHENGZHOU, China — In the Chinese city of Zhengzhou, a police officer wearing facial recognition glasses spotted a heroin smuggler at...

German police raid cyber-privacy groups

WRITTEN BY Patrick Howell O'Neill JUL 5, 2018 | CYBERSCOOP A suite of internet privacy-enabling tools is at the center of a storm brewing in Germany over...

Google to Face Multibillion-Euro European Union Antitrust Fine

By Valentina Pop and Sam Schechner Updated July 10, 2018 3:38 p.m. ET BRUSSELS—The European Union’s antitrust watchdog is expected to find Alphabet Inc.’sGOOGL -0.01% Google illegally abused the dominance of its Android...

Privacy Group Asks Court To Revive Suit Over Facebook Tracking

by Wendy Davis  @wendyndavis, July 5, 2018 Weighing in against Facebook, the advocacy group Electronic Privacy Information Center says a group of consumers should be allowed to...

Storage is Like Toilet Paper — Calline Sanchez, IBM

by Joh Toigo - June 6, 2018 Usually, I don’t expect such candor from industry insiders, but I was delighted to hear Calline Sanchez, one...

Ex-NSO Employee Caught Selling Stolen Phone Hacking Tool For $50 Million

July 05, 2018 Swati Khandelwal A former employee of one of the world's most powerful hacking companies NSO Group has been arrested and charged with stealing...

Attackers Can Use Sonic and Ultrasonic Signals to Crash Hard Drives

May 30, 2018Swati Khandelwal Researchers have demonstrated how sonic and ultrasonic signals (inaudible to human) can be used to cause physical damage to hard drives...

Free Thanatos Ransomware Decryption Tool Released

June 26, 2018Swati Khandelwal If your computer has been infected with Thanatos Ransomware and you are searching for a free ransomware decryption tool to unlock or decrypt...

How to Store Maps

MARCH 23, 2013 BY CAITLIN DEMPSEY Hallie Pritchett, the head of the Map and Government Information Library at the University of Georgia presented on the care and...

Why Privacy Should Be The Biggest Concern Of 2018

June 6, 2018 The recent start of the EU’s GDPR has added an even greater sense of urgency for a Facebook executive team already under intense pressure...

FTC and New York Attorney General Act Against Phantom Debt Brokers and Collectors

June 27th, 2018 The Federal Trade Commission and the New York Attorney General’s Office have charged two New York-based operations and their principals with running...

Tech Support Scammers Used Victims’ Webcams To Secretly Record ‘Testimonials’ For YouTube

Posted by msmash - June 4, 2018 A team of scammers sneakily filmed dozens of Australians by remotely accessing their webcams, then uploaded those videos onto...