article thumbnail

Details of a Computer Banking Scam

Schneier on Security

This is a longish video that describes a profitable computer banking scam that’s run out of call centers in places like India. The scammers convince the victims to give them remote access to their computers, and then that they’ve mistyped a dollar amount and have received a large refund that they didn’t deserve.

article thumbnail

What Happens to Electronic Records in the Archives?

The Texas Record

The Archives and information services division at the Texas State Library and Archives Commission (TSLAC) has a sophisticated electronic records processes. During E-records 2020 Brian Thomas, an Electronic Records Specialist at TSLAC, presented “What Happens Electronic Records Sent to the State Archives?” doc to.pdf).

Archiving 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Four Phases of CES: I, Consumer, Am Electronic

John Battelle's Searchblog

The post The Four Phases of CES: I, Consumer, Am Electronic appeared first on John Battelle's Search Blog. Call that the first incarnation of CES – literally, electronics for consumers. Stuff you plugged in, stuff that “electrified” your life with sound and video.

article thumbnail

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Schneier on Security

Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. This video shows a demonstration of ExpressVote all-in-one touchscreens purchased by Johnson County, Kansas. Yes, they're computers.

article thumbnail

More Attacks against Computer Automatic Update Systems

Schneier on Security

Also, our experts identified three additional victims: another video gaming company, a conglomerate holding company and a pharmaceutical company, all in South Korea. And this reminds us of an attack that we reported on a year ago: the CCleaner incident.

article thumbnail

Ubiquitous Video: Why We Need a Robots.txt For the Real World

John Battelle's Searchblog

The post Ubiquitous Video: Why We Need a Robots.txt For the Real World appeared first on John Battelle's Search Blog. Within a generation (or sooner), everyone with access to mass-market personal electronics (i.e., We already all carry the computing power and bandwidth on our person to effect such a signal.

article thumbnail

GUEST ESSAY: How stricter data privacy laws have redefined the ‘filing’ of our personal data

The Last Watchdog

The California Consumer Privacy Act (CCPA), soon to be superseded by the California Privacy Rights Act (CPRA) on January 1, 2023, applies to both electronic and paper records. For one, it’s estimated that 80 percent of the data gathered by organizations is unstructured; this includes text, video, audio and image files.