Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
How To Give Away Your Personal Information > NetSparsh - Viral Content you Love & Share

How To Give Away Your Personal Information

Identity Theft and Your Personal Information
--------------------------------------------
Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. In the past few months, one company after another is being forced to admit customer data has been lost or stolen.

In many cases, they have then come forth repeatedly over the next few weeks, or even months revising the estimated number of impacted customers. To date, I don't think any have ever lowered those numbers.

Identity Theft and Respected Companies
--------------------------------------
Generally speaking, these aren't fly-by-night organizations. These are respected companies who we've come to trust. In many instances, the loss wasn't even the work of a "malicious hacker" or other mystical force beyond their control; it was simple carelessness. The frequency of such reports of identity theft is making it difficult for consumers to feel confident in those with whom we do business. Customers are outraged that companies are not doing more to protect their information from the forces of evil.

You and Your Personal Information
---------------------------------
What about you? How are you at keeping you personal information under wraps? Some of these high profile incidents were the result of a trivial mistake that could have happened to anyone, including you.

Let's consider two events that didn't make the front page of C|Net or CNN.

The Keys To The Castle
----------------------
I consult for a client who doesn't trust me. It's nothing personal, they don't trust anyone. Whenever I visit this site, I am forced to contact the client throughout the visit to have them type a credential, or password, to grant access to a server or router. It's really annoying.

I really respect this client.

They don't really know me; I'm "the consultant". They're taking the proper steps when dealing with a consultant, providing the absolute minimum amount of information required. They would never give me unsupervised access to the network, and certainly wouldn't consider giving me passwords to their servers or routers. Not on purpose anyway.

Then there was the day I was working alongside the client and needed to reconfigure a router to complete a task. It's a long walk to the client's office to get the password for that particular router. Yes, this is a client who apparently has a unique password for every piece of equipment they own. Conveniently the client does keep a password protected file on a USB key that contained the needed information. The client was completely appropriate and even asked permission before using my laptop to fetch the file. I consented, and even made the gesture of turning away while he unlocked the file and retrieved the required password.

Have you ever used Google Desktop Search? It's a very cool, and aptly named, program that is a Google for your PC. It will index your files and make them searchable through a fast, flexible, and easy to use interface. It'll even cache the contents of files so if you move it off your hard drive, you'll still be able to see the contents of what was once there. Normally it does all this in the background when you computer is sitting idle. It also does it anytime you open a file.

Your Personal Information Is The Prize
--------------------------------------
You guessed it. Logins, passwords, public and private IP addresses. You name it, I had it. The client who would never give me a single password had turned over all of them at once.

What kind of wondrous data was now available? Personnel records, salary data, trade secrets? Maybe, if this was a corporate client. What about an academic, a University even? Student records, financial aid forms, and grant information. The possibilities were endless.

I promptly deleted the cache. The customer didn't want me to have the information, nor did I.

Would You Hand Your Credit Card To A Stranger?
----------------------------------------------
The previous example showed how simple it is to inadvertently reveal a large amount of data. It's funny how easily a person can dismiss this type of loss. After all, it's not your data, right?

So let's get a bit more personal.

Convenience And Computer Security Are Rarely Compatible
-------------------------------------------------------
I have a good trust relationship with my next client. She is quite comfortable with me administering and securing the corporate network. When it comes to her personal credit card information however, well, not so much.

Pretty much every web browser available these days has quite a few convenience features designed to make your day to day "net experience simpler". One of these convenience features came into play in this example, specifically the Firefox browser's auto-completion feature.

Not too long ago, I was tasked by this client to make arrangements for transfer of an internet domain to their ownership. Not a difficult task, she could have handled it herself. She was quite a capable computer user; she just didn't want to be bothered with the process.

I set aside 20 minutes to go through her domain registrar's step-by-step transfer wizard. I summoned the client to explain the details of the transfer displayed on my laptop screen. Facing the payment options screen the client asked if she could proceed. I relinquished control of my laptop and she entered the credit card information required to complete the transaction.

Web Browsers Cache Your Personal Information
--------------------------------------------
Most modern web browsers, for convenience, will cache information entered into web forms. The intent is to be able to recall this information if it's requested by another form. The following day, I was in the process of registering another domain with the same registrar and was surprised, for half a second, when the payment screen pre-populated using the same information used the day before. In addition to the credit card information I also had my client's personal home address, and telephone number. This was quite a bit of personal information the client never had any intention of giving me.

So What's Your Point?
---------------------
These two examples are very different but do share two important attributes. First, data the client intended to keep private was revealed to me. Second, the reason for the "compromise" of the data was due to the "victim" working with said data on a computer they neither owned nor were familiar with. Under different circumstances, the end results could have been quite devastating.

Conclusion
----------
When using a computer system you do not own, perhaps at a kiosk, or Internet Café, be aware that the computer itself is going to remember a lot of what you've done as part of basic functionality. Additionally, most entities that are going to provide you with access to a computer, including your employer, probably have systems in place that could collect additional data you don't desire to share. Even WiFi hotspots that allow you to use your own notebook or PDA to surf the web while sipping coffee can be a potential information collector.

The moral of the story is, when dealing with computer systems that aren't your own, never handle data or documents that you wouldn't want left behind unprotected. In all odds, once you walk away from that computer, you've done just that.

About The Author
----------------
Erich currently specializes in providing network and security solutions for small to medium businesses that frequently have to resolve the conflict of need versus budget. His commitment to precision and excellence is eclipsed only by his fascination with gadgets, particularly ones that are shiny, or that blink, or that beep. Erich is a staff writer for http://www.defendingthenet.com and several other e-zines. If you would like to contact Erich you can e-mail him at erich.heintz@gmail.com or DefendTheNet@ParaLogic.Net.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

SB Nation

The Dolphins' dangerous stadium just caused a security guard to get hurt
SB Nation
The inexplicably close walls behind the end zones at Hard Rock Stadium have created dangerous situations in the past. On Sunday, it caused an injury to a security guard who got destroyed by Miami Dolphins wide receiver Kenny Stills. Stills caught a 5 ...
Kenny Stills rewards security guard after sending her into endzone wallArizona Sports
Dolphins receiver accidentally blindsides security woman in brutal hitNew York Post
Kenny Stills cuts TD celebration short to check on security guard he ran overFor The Win
12up
all 25 news articles »

KOB

New Mexico districts to share funding for security upgrades
The State
More than 220 school campuses around New Mexico will be sharing state funding for security upgrades that will range from new doors and locks to fencing and security cameras. Forty-seven school districts applied for security improvements at 288 campuses.
Hundreds of New Mexico schools to get security upgradesKOB

all 4 news articles »

Fox News

Here's why Hillary Clinton losing her security clearance matters for the rest of us
Fox News
Hillary Clinton no longer has a security clearance. A letter released from the Department of State to Senator Chuck Grassley, a Republican from Iowa, says she lost her clearance on August 30 at her request. The State Department also withdrew security ...

and more »

WIRED

The Tiny Chip That Powers Up Pixel 3 Security
WIRED
Having a secure, mobile hardware element isn't especially novel; the ARM chips that power most higher-end Android smartphones have something called TrustZone, a secure enclave within the main processor that sits apart from the operating system.


WWBT NBC12 News

WANTED: Man breaks into home, accidentally takes selfie on security camera
WWBT NBC12 News
BATON ROUGE, LA (WAFB) - Say Cheese! Police are asking for the public's assistance identifying and locating a burglary suspect. The East Baton Rouge Parish Sheriff's Office says on Oct. 8, they were called about a residential burglary in the 1000 block ...

and more »

Daytona Beach News-Journal

Volusia County schools still implementing plans for security, mental health services
Daytona Beach News-Journal
After a difficult summer for Florida school districts as they struggled to revamp their security efforts before August, Volusia County is still working to tie up a few loose ends. New state mandates after the Parkland shooting in February called for ...


Fox News

5 security settings to turn on your router before it's too late
Fox News
Suppose your house has a top-notch security system. There are locks on all the doors. Security cameras monitor from every angle. No one could get in – except for an open door that you completely forgot about and therefore leads to every room in the house.
Home Network Security in the Internet AgeTechSpective

all 2 news articles »

247Sports

Kenny Stills hammers security guard after touchdown
247Sports
It was a great catch by Stills in tight quarters, but a female security guard took the worst hit, getting slammed into by Stills after the score. Both Stills and the guard looked to be shaken up by the play, as the guard was holding her arm and looking ...
Kenny Stills runs over security guard, gives her TD ballYahoo Sports
Video: Dolphins Security Guard Takes Hardest Hit Of The NFL's SeasonThe Spun (blog)
NFL - Associated Press NewsAssociated Press News

all 830 news articles »

ZDNet

​Fasoo expands data security to auto supply chain with Mando project
ZDNet
Fasoo has completed a data security project for global auto parts manufacturer Mando, the company announced. The security firm deployed its solution to all of the auto parts maker's global locations in 12 different countries, including the United ...


Military Times

US commander confident in ability of Afghan security forces
Military Times
WASHINGTON — The assassination of Afghan leaders in Kandahar province won't lessen U.S. support for the war in Afghanistan or deter local security forces in the fight against the Taliban, the top U.S. military commander in the Middle East said Saturday.

and more »
Google News

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More