IT Security For Libraries

IT Security for You and Your Library

http://www.infotoday.com/cilmag/jan14/Carver--IT-Security-for-You-and-Your-Library.shtml

STAY SAFE WHILE YOU’RE ONLINE

It’s easy, in theory, to keep your PC safe. It all comes down to three things:

Keep everything patched and updated.
Never trust anything.
Use good passwords.

How To Defend Yourself Against Hacking On Any Device

http://www.businessinsider.com/how-to-defend-yourself-against-hacking-on-any-device-2013-11
If you can plug it in or connect it to a network, your device—no matter what it is—can be harnessed by someone else. And that someone doesn’t have to be a Chinese superhacker to do some serious damage with it, either on purpose or by accident. It can be your Uncle Roger, who doesn’t have his new iPhone figured out and is cluelessly turning your lights on and off via your Belkin WeMo.

LISTen: An LISNews.org Program -- Episode #250

And we're back even though we're now illegal in Vietnam! Then again, so is the rest of LISNews as we discuss in the program. The hiatus is over and normal programming resumes notwithstanding September 2nd being a holiday. In this week's episode we talk about the threat of the Syrian Electronic Army and preparing for it. We also have a unique news miscellany that ends with a fun item from the Jewish Telegraphic Agency.

Related links:

Download here (MP3) (Ogg Vorbis) (Speex) (Extremely Hi-Fidelity Audio via Free Lossless Audio Codec), or subscribe to the podcast (MP3) to have episodes delivered to your media player. We suggest subscribing by way of a service like gpodder.net. New reading material for the Air Staff can be purchased here.

This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 United States License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/us/. -- Read More

24:00 minutes (9.65 MB)
mp3

The Fresh Prince of Bel-Where? Academic Publishing Scams

Phishing attacks targeting academia aren’t the most high-profile of attacks, though they’re more common than you might think. Student populations in themselves constitute a sizeable pool of potential victims for money mule recruitment and other job scams, in fact anything that promises an easy supplemental income, unfeasibly cheap or free trendy gadgetry, and so on. But I’m talking about attacks against the institutions, rather than their ‘customers’: for example, targeted social engineering attacks as a means of accessing intellectual property. Some academic research has appreciable monetary value in its own right, and much of it is developed in partnership with and funded by businesses with a direct interest in monetizing it: that makes it of interest to people with an interest in getting in first.

LISTen: An LISNews.org Program -- Episode #229

This week's episode looks around the LISHost galaxy while looking at some ambiguous information in a speculative manner.

Related links:

Download here (MP3) (Ogg Vorbis), or subscribe to the podcast (MP3) to have episodes delivered to your media player. We suggest subscribing by way of a service like gpodder.net. A way to send gifts of replacement hardware to Erie Looking Productions is available here via Amazon, as always.

This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 United States License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/us/.

LISTen: An LISNews.org Program -- Episode #228

This week's program deals with Wikipedia hoaxing, an Internet icon, and a miscellany of brief items.

Related links:

Download here (MP3) (Ogg Vorbis), or subscribe to the podcast (MP3) to have episodes delivered to your media player. We suggest subscribing by way of a service like gpodder.net. The list of hardware sought to replace our ever-increasing damage control report can be found here and can be directly purchased and sent to assist The Air Staff in rebuilding to a more normal operations capability.

This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 United States License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/us/.

Simple tricks websites can use to fingerprint you

The "I Know..." series of blog posts shows relatively simple tricks [malicious] websites can use to coax a browser into revealing information that it probably should not. Firewalls, anti-virus software, anti-phishing scam black lists, and even patching your browser was not going to help.

Fortunately, if you are using one of today’s latest and greatest browsers (Chrome, Firefox, Internet Explorer, Safari, etc.), these tricks, these attack techniques, mostly don’t work anymore. The unfortunate part is that they were by no means the only way to accomplish these feats.

I Know…

SEC4LIB The Place To Learn About IT Security Issues In Libraries

You might be interested in the new(ish) list where we talk about IT Security stuff, SEC4LIB. It's low volume and you'll probably learn a few things about security issues.

You may also like to check out the IT Security For Libraries section here at LISNews: http://lisnews.org/security

Hacker Group Breaches Library of Congress Site, Publishes Passwords

Hacker Group Breaches Library of Congress Site, Publishes Passwords
A group of hackers claims to have breached the official website of the Library of Congress, America’s national library.

The group claiming responsibility, BlitzSec, decried the wildly unpopular US Congress and said it used a SQL injection attack to access the Library of Congress Website's back end database and expose user names, passwords and email addresses. The group has posted data taken from the Library on the file sharing Web site Pastebin.

Syndicate content