Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
How To Give Away Your Personal Information > NetSparsh - Viral Content you Love & Share

How To Give Away Your Personal Information

Identity Theft and Your Personal Information
--------------------------------------------
Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. In the past few months, one company after another is being forced to admit customer data has been lost or stolen.

In many cases, they have then come forth repeatedly over the next few weeks, or even months revising the estimated number of impacted customers. To date, I don't think any have ever lowered those numbers.

Identity Theft and Respected Companies
--------------------------------------
Generally speaking, these aren't fly-by-night organizations. These are respected companies who we've come to trust. In many instances, the loss wasn't even the work of a "malicious hacker" or other mystical force beyond their control; it was simple carelessness. The frequency of such reports of identity theft is making it difficult for consumers to feel confident in those with whom we do business. Customers are outraged that companies are not doing more to protect their information from the forces of evil.

You and Your Personal Information
---------------------------------
What about you? How are you at keeping you personal information under wraps? Some of these high profile incidents were the result of a trivial mistake that could have happened to anyone, including you.

Let's consider two events that didn't make the front page of C|Net or CNN.

The Keys To The Castle
----------------------
I consult for a client who doesn't trust me. It's nothing personal, they don't trust anyone. Whenever I visit this site, I am forced to contact the client throughout the visit to have them type a credential, or password, to grant access to a server or router. It's really annoying.

I really respect this client.

They don't really know me; I'm "the consultant". They're taking the proper steps when dealing with a consultant, providing the absolute minimum amount of information required. They would never give me unsupervised access to the network, and certainly wouldn't consider giving me passwords to their servers or routers. Not on purpose anyway.

Then there was the day I was working alongside the client and needed to reconfigure a router to complete a task. It's a long walk to the client's office to get the password for that particular router. Yes, this is a client who apparently has a unique password for every piece of equipment they own. Conveniently the client does keep a password protected file on a USB key that contained the needed information. The client was completely appropriate and even asked permission before using my laptop to fetch the file. I consented, and even made the gesture of turning away while he unlocked the file and retrieved the required password.

Have you ever used Google Desktop Search? It's a very cool, and aptly named, program that is a Google for your PC. It will index your files and make them searchable through a fast, flexible, and easy to use interface. It'll even cache the contents of files so if you move it off your hard drive, you'll still be able to see the contents of what was once there. Normally it does all this in the background when you computer is sitting idle. It also does it anytime you open a file.

Your Personal Information Is The Prize
--------------------------------------
You guessed it. Logins, passwords, public and private IP addresses. You name it, I had it. The client who would never give me a single password had turned over all of them at once.

What kind of wondrous data was now available? Personnel records, salary data, trade secrets? Maybe, if this was a corporate client. What about an academic, a University even? Student records, financial aid forms, and grant information. The possibilities were endless.

I promptly deleted the cache. The customer didn't want me to have the information, nor did I.

Would You Hand Your Credit Card To A Stranger?
----------------------------------------------
The previous example showed how simple it is to inadvertently reveal a large amount of data. It's funny how easily a person can dismiss this type of loss. After all, it's not your data, right?

So let's get a bit more personal.

Convenience And Computer Security Are Rarely Compatible
-------------------------------------------------------
I have a good trust relationship with my next client. She is quite comfortable with me administering and securing the corporate network. When it comes to her personal credit card information however, well, not so much.

Pretty much every web browser available these days has quite a few convenience features designed to make your day to day "net experience simpler". One of these convenience features came into play in this example, specifically the Firefox browser's auto-completion feature.

Not too long ago, I was tasked by this client to make arrangements for transfer of an internet domain to their ownership. Not a difficult task, she could have handled it herself. She was quite a capable computer user; she just didn't want to be bothered with the process.

I set aside 20 minutes to go through her domain registrar's step-by-step transfer wizard. I summoned the client to explain the details of the transfer displayed on my laptop screen. Facing the payment options screen the client asked if she could proceed. I relinquished control of my laptop and she entered the credit card information required to complete the transaction.

Web Browsers Cache Your Personal Information
--------------------------------------------
Most modern web browsers, for convenience, will cache information entered into web forms. The intent is to be able to recall this information if it's requested by another form. The following day, I was in the process of registering another domain with the same registrar and was surprised, for half a second, when the payment screen pre-populated using the same information used the day before. In addition to the credit card information I also had my client's personal home address, and telephone number. This was quite a bit of personal information the client never had any intention of giving me.

So What's Your Point?
---------------------
These two examples are very different but do share two important attributes. First, data the client intended to keep private was revealed to me. Second, the reason for the "compromise" of the data was due to the "victim" working with said data on a computer they neither owned nor were familiar with. Under different circumstances, the end results could have been quite devastating.

Conclusion
----------
When using a computer system you do not own, perhaps at a kiosk, or Internet Café, be aware that the computer itself is going to remember a lot of what you've done as part of basic functionality. Additionally, most entities that are going to provide you with access to a computer, including your employer, probably have systems in place that could collect additional data you don't desire to share. Even WiFi hotspots that allow you to use your own notebook or PDA to surf the web while sipping coffee can be a potential information collector.

The moral of the story is, when dealing with computer systems that aren't your own, never handle data or documents that you wouldn't want left behind unprotected. In all odds, once you walk away from that computer, you've done just that.

About The Author
----------------
Erich currently specializes in providing network and security solutions for small to medium businesses that frequently have to resolve the conflict of need versus budget. His commitment to precision and excellence is eclipsed only by his fascination with gadgets, particularly ones that are shiny, or that blink, or that beep. Erich is a staff writer for http://www.defendingthenet.com and several other e-zines. If you would like to contact Erich you can e-mail him at erich.heintz@gmail.com or DefendTheNet@ParaLogic.Net.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Magazine

Kushner Still Has Security Clearance, Despite Additional Reported Issues
New York Magazine
Two weeks ago, the Justice Department informed the White House that a decision on Jared Kushner's permanent security clearance would be further delayed because of significant issues that require additional investigation regarding his background ...
Report: Jared Kushner's White House security clearance hits new snagUSA TODAY
White House Told Kushner's Security Clearance Will Be DelayedNew York Times
Trump: Chief of Staff John Kelly Will Decide on Jared Kushner's Security ClearanceTIME
CNN -HuffPost -Washington Post -CNN
all 222 news articles »

New York Magazine

CPAC Speaker Needed Security Escort After Flagging Trump's Sexual Misconduct
New York Magazine
Writer Mona Charen provided a rare bit of criticism for President Trump the annual CPAC conference on Saturday, and reportedly needed a security escort to leave after being jeered over her comments. The National Review columnist was one of four women ...
Going Rogue at CPAC: Mona Charen Slams Sexist Hypocrisy and Racism at CPAC; Calls invitation of Le Pen a ...The Weekly Standard
CPAC panelist needed security to exit conference after ripping GOP for endorsing 'sexual harassers and abusers'Raw Story

all 758 news articles »

GlobeNewswire (press release)

TIM and Cisco Join Forces To Increase The IT Security Of Italian Companies
GlobeNewswire (press release)
BARCELONA, Spain, Feb. 25, 2018 (GLOBE NEWSWIRE) -- Mobile World Congress — Starting from March, TIM, the leading provider of mobile and fixed telecommunication services in Italy, in partnership with Cisco will offer “TIM Safe WEB”, a highly secure ...

and more »

CNET

Apple iCloud security change in China raises privacy questions
CNET
The rep also said Apple decided that discontinuing the iCloud service in China would make for a bad user experience and "less data security and privacy for our Chinese customers." Amazon and Microsoft also partner with China-based companies to offer ...

and more »

Chron.com

Security guard kills man who was shooting at Houston strip club
KTRK-TV
Police say a security guard shot and killed a man outside a club in northwest Houston. Eyewitness News reporter Pooja Lodhia is live where the shooting happened with the latest on the investigation. HPD: a security guard shot and killed a customer who ...
Armed, shirtless man fatally shot by security guard at Houston nightclubChron.com

all 6 news articles »

The Gazette: Eastern Iowa Breaking News and Headlines

School security in Iowa takes on renewed priority
The Gazette: Eastern Iowa Breaking News and Headlines
Schools in Iowa soon could be legally required to have such security plans. Senate File 2253, which the Senate advanced earlier this month, would require all districts to have plans for each school building by June 30, 2019, that contemplate active ...


Washington Post

Insurgents kill more than 20 security forces in separate attacks in Afghanistan
Washington Post
KABUL — More than 20 security forces were reported killed Saturday in attacks by Taliban militants in various parts of Afghanistan, including Kabul — a sign of the insurgents' resiliency despite a surge of offensives by U.S. and Afghan forces in ...

and more »

Augustana security, Rock Island police investigate vandalism at Evald Hall
Quad City Times
Augustana College's Carlsson Evald Hall was the target of vandals who left racial slurs, symbols and one message suggesting an act of violence against the college, spokeswoman Ashleigh Johnston said Saturday night. A campus security officer discovered ...

and more »

CNN

Car intentionally hits security barrier near White House
CNN
(CNN) A passenger vehicle intentionally hit a security barrier near the White House on Friday, a law enforcement source told CNN, though the Secret Service said the car didn't breach the secure complex that surrounds the executive mansion. The incident ...
White House Briefly Put On Lockdown After Driver Hits Security BarrierNPR
White House locked down after vehicle hits security barrierNBCNews.com
Car crashes into White House security barriersNew York Post
USA TODAY -ABC News -TIME -Twitter
all 477 news articles »
Google News

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More