7396
[Breaking story as of 26-May-2015 at 4pm EDT] IRS says thieves stole tax info from 100,000 | Associated Press
WASHINGTON (AP) — Thieves used an online service provided by the IRS to gain access to information from more than 100,000 taxpayers, the agency said Tuesday. The information included tax returns and other tax information on file with the IRS. The IRS said the thieves accessed a system called "Get Transcript." In order to access the information, the thieves cleared a security screen that required knowledge about the taxpayer, including Social Security number, date of birth, tax filing status and street address. "The IRS notes this issue does not involve its main computer system that handles tax filing submission; that system remains secure," the agency said in a statement. The IRS said thieves targeted the system from February to mid-May. The service has been temporarily shut down. "In all, about 200,000 attempts were made from questionable email domains, with more than 100,000 of those attempts successfully clearing authentication hurdles," the agency said. "During this filing season, taxpayers successfully and safely downloaded a total of approximately 23 million transcripts." Tax returns can include a host of personal information that can help someone steal an identity, including Social Security numbers and birthdates of dependents and spouses. However, the IRS said the thieves appeared to already have a lot of personal information about the victims. The IRS said it is notifying taxpayers whose information was accessed. ___ Follow Stephen Ohlemacher on Twitter: http://twitter.com/stephenatap
yesterday
Tracking Human Mobility using WiFi signals | Sune Lehmann's blog
Tracking Human Mobility using WiFi signals | Sune Lehmann's blog
yesterday
Performance reviews the open source way [from Redhat's processes] | Opensource(dot)com
Red Hatter Sam Knuth shares how he measures and manages performance for his team of 100 people.
2 days ago
McConnell can't save the NSA's surveillance program [Comment is free] | The Guardian
McConnell can't save the NSA's surveillance program [Comment is free] | The Guardian
4 days ago
Today's terrifying Web security vulnerability, courtesy of the 1990s crypto wars | Boing Boing
Today's terrifying Web security vulnerability, courtesy of the 1990s crypto wars | Boing Boing
4 days ago
(500) http://dltj.org/p25677
New blog post: Institution-wide ORCID Adoption Test in U.K. Shows Promise
from twitter
5 days ago
Developing and implementing a technical framework for interoperable rights statements | Digital Public Library of America
Developing and implementing a technical framework for interoperable rights statements | Digital Public Library of…
5 days ago
LogJam Encryption Flaw Puts All Internet Users At Risk [flaw in TLS protocol downgrades encryption] | Freedom Hacker
Researchers have uncovered a gaping encryption flaw in the way some servers handle the Diffie-Hellman Key exchange, the LogJam vulnerability downgrades TLS,
5 days ago
Man Photocopies Kindle To Make Analog Backup Of Book - Album on Imgur
furtherfield on Twitter: "Man Photocopies Kindle To Make Analog Backup Of Book - …
from twitter
6 days ago
furtherfield on Twitter: "Man Photocopies Kindle To Make Analog Backup Of Book - http://t.co/lXlqKANTym http://t.co/tPoPWeIi7D"
There would be a digital preservation joke in here somewhere if the DRM implications weren't so serious.
from twitter
6 days ago
[Free book excerpt!] HTTP/2: A New Excerpt from High Performance Browser Networking | O'Reilly Media
The new HTTP/2 standard is finally here. Approved earlier this year, HTTP/2 adds a new binary framing layer that will help make applications faster, simpler, and more robust. This chapter from the new release of High Performance Browser Networking...
6 days ago
Pew Research finds more Americans value their privacy in the abstract than in reality | NetworkWorld
The Pew Research survey results in the above graphic show Americans care plenty about privacy, but they also say a lot about how that concern rises and falls depending on the situation. And not in a good way.
6 days ago
E-paper display gives payment cards a changing security code | ComputerWorld
By embedding an e-paper display in the back of credit and debit cards, payment specialist Oberthur Technologies hopes to make online fraud a lot more difficult. An upcoming test in France will show if the underlying technology can cut it.
6 days ago
Saying information wants to be free does more harm than good | Cory Doctorow in The Guardian
"They want to be able to use the network and their computers without mandatory surveillance and spyware installed under the rubric of "stopping piracy" because censorship and surveillance are themselves corrosive to free thought, intellectual curiosity and an open and fair society."
7 days ago
How to give more persuasive presentations: A Q&A with Nancy Duarte | TED Blog
Presentation expert Nancy Duarte, who gave the TED Talk “The secret structure of great talks,” has built her career helping people express their ideas in presentations -- and helping them get comfortable giving high-stakes talks in public.
7 days ago
Making Ansible a Bit Faster [profiling, SSH pipelining, SSH ControlPersist] | Adam's Tech Blog
Making Ansible a Bit Faster [profiling, SSH pipelining, SSH ControlPersist] | Adam's Tech Blog
8 days ago
Untitled (http://www.Internet.org/)
[Facebook's] Is Not Neutral, Not Secure, and Not the Internet | Electronic Frontier…
from twitter
8 days ago
[Facebook's] Internet.org Is Not Neutral, Not Secure, and Not the Internet | Electronic Frontier Foundation
Facebook's Internet.org project, which offers people from developing countries free mobile access to selected websites, has been pitched as a philanthropic initiative to connect two thirds of the world who don’t yet have Internet access. We completely agree that the global digital divide should be closed. However, we question whether this is the right way to do it.
8 days ago
Yes, Switching To HTTPS Is Important, And No It's Not A Bad Thing | Techdirt
Yes, Switching To HTTPS Is Important, And No It's Not A Bad Thing | Techdirt
10 days ago
The internet is running out of room [theoretical capacity of fibre] – but we can save it | New Scientist
The internet is running out of room [theoretical capacity of fibre] – but we can save it | New Scientist
10 days ago
The Problem with Comments | Library Babel Fish
The Problem with Comments | Library Babel Fish
12 days ago
Shift to Linked Data for production [for library data] | OCLC's Hanging Together
Shift to Linked Data for production [for library data] | OCLC's Hanging Together
13 days ago
The Wolfram Language Image Identification Project [artificial intelligence-driven entity recognition from an image]
Image recognition site – just drag your image & identify. Uses the ImageIdentify function from the Wolfram Language. Powered by Wolfram Cloud.
13 days ago
Open-Sourcing MoMA’s Digital Vault | MoMA
Open-Sourcing MoMA’s Digital Vault | MoMA
13 days ago
Common Ground: Exploring Compatibilities Between the Linked Data Models of the Library of Congress and OCLC
Common Ground: Exploring Compatibilities Between the Linked Data Models of the Library of Congress and OCLC
13 days ago
Autonomous cars will destroy millions of jobs and reshape the US economy by 2025 | Quartz
Autonomous cars will destroy millions of jobs and reshape the US economy by 2025 | Quartz
13 days ago
The View from the Front Seat of the Google Self-Driving Car | Backchannel on Medium
The View from the Front Seat of the Google Self-Driving Car | Backchannel on Medium
14 days ago
5 tips for promoting an inclusive environment [meritocracy works best with diversity of thought] | Opensource(dot)com
5 tips for promoting an inclusive environment [meritocracy works best with diversity of thought] |…
14 days ago
What you need to know about the laws of space [e.g., there is a United Nations Office for Outer Space Affairs…who knew?] | Engadget
Neil deGrasse Tyson has said he loses "sleep at night wondering whether we are intelligent enough to figure out the universe." It's a valid concern. We'v
14 days ago
Thieves using a $17 device [wireless signal booster] to break into cars with keyless systems | NetworkWorld
Thieves using a $17 device [wireless signal booster] to break into cars with keyless systems | NetworkWorld
14 days ago
The Truth About Smartphone Apps That Secretly Connect to User Tracking and Ad Sites | MIT Technology Review
Security researchers have developed an automated system for detecting Android apps that secretly connect to ad sites and user tracking sites.
14 days ago
Hosting Your Website After Death | Jeff Reifman's web design blog
Want to host your WordPress site for a hundred years? It's an impossibly difficult undertaking. Let's explore the gaps technologists have left themselves in planning our digital legacy. | Difficulty: Beginner; Length: Medium; Tags: WordPress, Hosting
15 days ago
Disassembling the [Amazon] Dash | Bits of Cents
On Thursday I got an email from Amazon saying I had been selected to try out two Dash buttons at zero cost. To be honest it as kind of surprising given that although we order...
15 days ago
Shut Down Your Office. You Now Work in Slack | Backchannel on Medium
The messaging service first took over the digital work world. Now it’s everywhere.
15 days ago
Saving the digital record [digital archivists at work in Harvard] | Harvard Gazette
Saving the digital record [digital archivists at work in Harvard] | Harvard Gazette
16 days ago
The Mythical Man-Month: What ArchivesSpace Isn't (and Why That's OK) | Bentley Historical Library, Univ of Michigan
The Mythical Man-Month: What ArchivesSpace Isn't (and Why That's OK) | Bentley Historical Library, Univ of Michigan
16 days ago
[U.S.] Border search of laptop "violated" privacy, says federal judge | ZDnet
A federal judge's opinion is the latest scathing retort to US border searches.
16 days ago
The new struggles facing open source [free vs. open licensing, corporate foundations] | InfoWorld
The new struggles facing open source [free vs. open licensing, corporate foundations] | InfoWorld
18 days ago
The rise and rise of open source [results from annual Future of Open Source survey] | InfoWorld
The annual Future of Open Source survey confirms what we all suspected: Open source has won
18 days ago
CTO Megan Smith explains how women in tech are erased from history - Boing Boing
RT : CTO of the US Megan Smith explains how women in tech are erased from history: via
from twitter
19 days ago
It’s Official: A.I.s are Now Re-Writing History [Google AutoAwesome mashes up photos] | PetaPixel
The other day I created a Google+ album of photos from our holiday in France. Google’s AutoAwesome algorithms applied some nice Instagram-like filters to s
19 days ago
Planning for the Evolving Role of Metadata Services, an ALCTS Virtual Preconference, 2-4 Jun 2015
Planning for the Evolving Role of Metadata Services, an ALCTS Virtual Preconference, 2-4 Jun 2015
19 days ago
Court Rules NSA Bulk Data Collection Was Never Authorized By Congress | Wired
The United States Court of Appeals for the Second Circuit ruled on Thursday that the NSA's bulk collection of phone metadata was not authorized under the Patriot Act and was therefore illegal.
19 days ago
EPUB for Open Textbooks | Center on Online Learning and Students with Disabilities
EPUB for Open Textbooks | Center on Online Learning and Students with Disabilities
19 days ago
The Museum-Library-Archive [comparison and contrast of mission and function] by Howard Besser
The Museum-Library-Archive [comparison and contrast of mission and function] by Howard Besser
19 days ago
We Sent a Dick Pic to the Moon—And We're Doing It Again | WIRED
We Sent a Dick Pic to the Moon—And We're Doing It Again | WIRED
19 days ago
Upon This Wrist [is the Apple Watch life-changing? meh] | The Message at Medium
Upon This Wrist [is the Apple Watch life-changing? meh] | The Message at Medium
19 days ago
Patron Privacy in Digital Library and Information Systems - National Information Standards Organization
RT : Good Friday Morning, Twitter peeps. Want to catch up on the call yesterday? Recording on bottom of pg:
NISOprivacy  from twitter
19 days ago
Research universities form technology consortium to share content | University of Michigan News
Research universities form technology consortium [Unizin] to share content | University of Michigan News
NISOprivacy  from twitter
20 days ago
Credit Card Data Is Less Anonymous Than You Think | MIT Technology Review
Credit Card Data Is Less Anonymous Than You Think [on deanonymizing data problems] | MIT Tech Review
NISOprivacy  from twitter
20 days ago
Librarians Versus the NSA | The Nation
RT : Librarians vs the NSA - great article in The Nation featuring our very own !
from twitter
20 days ago
What Every Librarian Needs to Know About HTTPS | Electronic Frontier Foundation
What Every Librarian Needs to Know About HTTPS | Electronic Frontier Foundation
20 days ago
Google’s slow fade with librarians | Jessamyn West in The Message on Medium
Google’s slow fade with librarians | Jessamyn West in The Message on Medium
21 days ago
Getting Started with OpenRefine | Thomas Padilla
Getting Started with OpenRefine | Thomas Padilla
21 days ago
Notes on Company Culture | Eamon Leonard on Medium
Notes on Company Culture | Eamon Leonard on Medium
21 days ago
RFC 7525 (BCP 195): Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
Transport Layer Security (TLS) and Datagram Transport Layer Security
(DTLS) are widely used to protect data exchanged over application
protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the
last few years, several serious attacks on TLS have emerged,
including attacks on its most commonly used cipher suites and their
modes of operation. This document provides recommendations for
improving the security of deployed services that use TLS and DTLS.
The recommendations are applicable to the majority of use cases.
22 days ago
Web annotation is already at scale | Meedan Labs on Medium
Web annotation is already at scale | Meedan Labs on Medium
22 days ago
Library Technology Procurement Registry: documents from libraries seeking strategic library technology products and services
Library Technology Procurement registry connects vendors to libraries seeking technology products and services. This resource is a component of Library Technology Guides. Operated by Marshall Breeding.
23 days ago
Congressman with computer science degree: Encryption back-doors are ‘technologically stupid’ | Washington Post
Advocates for building ways for law enforcement to access secure content get chilly reception on Capitol Hill.
25 days ago
No patch for remote code-execution bug in D-Link and Trendnet routers | Ars Technica
No patch for remote code-execution bug in D-Link and Trendnet routers | Ars Technica
25 days ago
« earlier      
access accessibility advertising agile ajax ala ala12 ala2007 alamw10 amazon amazon_ec2 apache api apple architecture audio barcode blog book browser business career citation cloudcomputing cmh code4lib collaboration color commerce comparison conference copyright creativecommons css culture data database datamining description design development digital digital_libraries digitization directory discovery disruption disruptive dltj dns dpla dplafest dr drc drm drupal dspace ebook ebooks eclipse economics education ejb3 ejournal email encryption etextbook facebook fedora fedora_dr finance firefox flash flying foss4lib frbr free funstuff future gbs gentoo google googlebooksearch government graphics gtd hardware hcod highered history howto html html5 http humor identifier iii ils imaging innovation internet internetarchive interview j2ee j2karclib java javascript jisc jpeg2000 kindle koha legal legislation libraries library library2.0 library20 librarysoa licensing linkeddata linux lita litaforum loc maps marc marketing mashup metadata metasearch microformats mobile monitoring mswindows music mysql networking news ngc4lib niso oai oaiore oclc odcecon ohiolink opac open openaccess openlibrary opensource osx paper pdf perl pgp phone photography photoshop php pipa politics presentation preservation printondemand privacy productivity programming protect-ip publishers publishing python rdf reference repair repository research resource resourcesync rest retail rootstrikers sakai scalability schoss science screencast seam search searchengine security semanticweb service shibboleth soa socialmedia socialnetworking software sopa source spam specification standards statistics storage streaming subversion support sysadmin tedtalk television textbook tools travel trends tutorial twitter unconference univsysohio unread usability utilities video visualization weather web web2.0 webarchitecture webdesign webdev webservices wikipedia wireless wordpress worldcat writing xml xslt

Copy this bookmark:



description:


tags: