article thumbnail

Identifying People by Metadata

Schneier on Security

Interesting research: " You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information ," by Beatrice Perez, Mirco Musolesi, and Gianluca Stringhini. Abstract: Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world.

Metadata 111
article thumbnail

7 Questions to Determine if Your Data is an Asset

AIIM

FREE Webinar: Learn more from this Case Study on Leveraging Data to Transform Customer Experience]. Knowledge and documentation metadata? It’s important to understand what data you have, why you have it, and why you need it - it's then that your data can be leveraged as an asset. Is your data an asset?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analyzing AZORult malware using NSA Ghidra suite

Security Affairs

Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware. The sample is a PE32 file apparently coded in Visual C++, containing references to major IT companies in its metadata fields like Google and Amazon. Introduction.

article thumbnail

Information Governance – 3 Common Pitfalls and How to Avoid Them

AIIM

Case studies and examples of peers in other organizations can be powerful techniques. Vendor-neutral research, or case studies, can be valuable tools when communicating with internal decision-makers. Getting all parties to agree is a far harder and time-consuming task.

article thumbnail

Duo Security created open tools and techniques to identify large Twitter botnet

Security Affairs

The above heuristics are organized in the 3 categories, the “Account attributes,” “Content,” and “Content Metadata.” The experts shared a case study related to the discovery of a sophisticated botnet of at least 15,000 bots involved in a cryptocurrency scam.

Security 189
article thumbnail

Clearing Up the Confusion between Document Management Systems and Digital Preservation Systems

Preservica

Electronic records are not going to survive by accident.

article thumbnail

Harvesting Preservica metadata to your library discovery layer using APIs - Case Study: Preservica to Ex Libris' Primo

Preservica

Challenges ProQuest supplied the theses in PDF format on hard drives in batches, each batch was accompanied by a file of metadata in MARC format. We realized that we needed to convert the metadata to a better format, split it by record, and ingest it into Preservica. Click below to watch the replay of this educational webinar.