Identity Theft and Your Personal Information
Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. In the past few months, one company after another is being forced to admit customer data has been lost or stolen.
In many cases, they have then come forth repeatedly over the next few weeks, or even months revising the estimated number of impacted customers. To date, I don't think any have ever lowered those numbers.
Identity Theft and Respected Companies
Generally speaking, these aren't fly-by-night organizations. These are respected companies who we've come to trust. In many instances, the loss wasn't even the work of a "malicious hacker" or other mystical force beyond their control; it was simple carelessness. The frequency of such reports of identity theft is making it difficult for consumers to feel confident in those with whom we do business. Customers are outraged that companies are not doing more to protect their information from the forces of evil.
You and Your Personal Information
What about you? How are you at keeping you personal information under wraps? Some of these high profile incidents were the result of a trivial mistake that could have happened to anyone, including you.
Let's consider two events that didn't make the front page of C|Net or CNN.
The Keys To The Castle
I consult for a client who doesn't trust me. It's nothing personal, they don't trust anyone. Whenever I visit this site, I am forced to contact the client throughout the visit to have them type a credential, or password, to grant access to a server or router. It's really annoying.
I really respect this client.
They don't really know me; I'm "the consultant". They're taking the proper steps when dealing with a consultant, providing the absolute minimum amount of information required. They would never give me unsupervised access to the network, and certainly wouldn't consider giving me passwords to their servers or routers. Not on purpose anyway.
Then there was the day I was working alongside the client and needed to reconfigure a router to complete a task. It's a long walk to the client's office to get the password for that particular router. Yes, this is a client who apparently has a unique password for every piece of equipment they own. Conveniently the client does keep a password protected file on a USB key that contained the needed information. The client was completely appropriate and even asked permission before using my laptop to fetch the file. I consented, and even made the gesture of turning away while he unlocked the file and retrieved the required password.
Have you ever used Google Desktop Search? It's a very cool, and aptly named, program that is a Google for your PC. It will index your files and make them searchable through a fast, flexible, and easy to use interface. It'll even cache the contents of files so if you move it off your hard drive, you'll still be able to see the contents of what was once there. Normally it does all this in the background when you computer is sitting idle. It also does it anytime you open a file.
Your Personal Information Is The Prize
You guessed it. Logins, passwords, public and private IP addresses. You name it, I had it. The client who would never give me a single password had turned over all of them at once.
What kind of wondrous data was now available? Personnel records, salary data, trade secrets? Maybe, if this was a corporate client. What about an academic, a University even? Student records, financial aid forms, and grant information. The possibilities were endless.
I promptly deleted the cache. The customer didn't want me to have the information, nor did I.
Would You Hand Your Credit Card To A Stranger?
The previous example showed how simple it is to inadvertently reveal a large amount of data. It's funny how easily a person can dismiss this type of loss. After all, it's not your data, right?
So let's get a bit more personal.
Convenience And Computer Security Are Rarely Compatible
I have a good trust relationship with my next client. She is quite comfortable with me administering and securing the corporate network. When it comes to her personal credit card information however, well, not so much.
Pretty much every web browser available these days has quite a few convenience features designed to make your day to day "net experience simpler". One of these convenience features came into play in this example, specifically the Firefox browser's auto-completion feature.
Not too long ago, I was tasked by this client to make arrangements for transfer of an internet domain to their ownership. Not a difficult task, she could have handled it herself. She was quite a capable computer user; she just didn't want to be bothered with the process.
I set aside 20 minutes to go through her domain registrar's step-by-step transfer wizard. I summoned the client to explain the details of the transfer displayed on my laptop screen. Facing the payment options screen the client asked if she could proceed. I relinquished control of my laptop and she entered the credit card information required to complete the transaction.
Web Browsers Cache Your Personal Information
Most modern web browsers, for convenience, will cache information entered into web forms. The intent is to be able to recall this information if it's requested by another form. The following day, I was in the process of registering another domain with the same registrar and was surprised, for half a second, when the payment screen pre-populated using the same information used the day before. In addition to the credit card information I also had my client's personal home address, and telephone number. This was quite a bit of personal information the client never had any intention of giving me.
So What's Your Point?
These two examples are very different but do share two important attributes. First, data the client intended to keep private was revealed to me. Second, the reason for the "compromise" of the data was due to the "victim" working with said data on a computer they neither owned nor were familiar with. Under different circumstances, the end results could have been quite devastating.
Conclusion
When using a computer system you do not own, perhaps at a kiosk, or Internet Café, be aware that the computer itself is going to remember a lot of what you've done as part of basic functionality. Additionally, most entities that are going to provide you with access to a computer, including your employer, probably have systems in place that could collect additional data you don't desire to share. Even WiFi hotspots that allow you to use your own notebook or PDA to surf the web while sipping coffee can be a potential information collector.
The moral of the story is, when dealing with computer systems that aren't your own, never handle data or documents that you wouldn't want left behind unprotected. In all odds, once you walk away from that computer, you've done just that.
About The Author
Erich currently specializes in providing network and security solutions for small to medium businesses that frequently have to resolve the conflict of need versus budget. His commitment to precision and excellence is eclipsed only by his fascination with gadgets, particularly ones that are shiny, or that blink, or that beep. Erich is a staff writer for http://www.defendingthenet.com and several other e-zines. If you would like to contact Erich you can e-mail him at erich.heintz@gmail.com or team@defendingthenet.com or try DefendTheNet@ParaLogic.Net.
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
First I would like to stress I am condoning the... Read More
Before we start, I want to make it clear that... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Much has been said on the theory of password protection... Read More
Nowadays more and more people are using a computer. A... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
In recent days, I was one of the unfortunate persons... Read More
Paypal is a great site and is used by many... Read More
If you run any type of Internet business, Adware and... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Viruses are, however, not the only malicious software programs out... Read More
Huge number of spyware software applications are available in the... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
First, let's do a little recap'. As I stated in... Read More
There has not been a time in the history of... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
When it comes to a secure website and passwords it... Read More
You and I are a lot alike. We are both... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
The top five online scams on the Internet hit nearly... Read More
Since its birth, the Internet has grown and expanded to... Read More
In today's times spyware is a very serious issue and... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
The Internet is a vast International Network of people and... Read More
Have you ever bought a product or service from the... Read More
Identity theft is one of the most common criminal acts... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Since its birth, the Internet has grown and expanded to... Read More
This is not some new fangled techno-speak, it is a... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
The average computer is packed with hidden software that can... Read More
The trash folder in my main inbox hit 4000 today.... Read More
The first thing people think about when defending their computers... Read More
Threats we ordinary Web users face online leave us no... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
There are folks out there who use their powers for... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Spyware is software or hardware installed on a computer without... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Have you ever got an email asking you to confirm... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Ok, you've got a computer, and you get online. You... Read More
Fishing on the Internet has come a long way. However,... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
The Threat10 years ago you could probably have run no... Read More
So called phishers try to catch the information about the... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
You'd better learn news from media, not from emails, security... Read More
So you want to know who your kids are chatting... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Only the top spyware removers are successful at detecting and... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Sooner or later everyone with an email account will receive... Read More
You've seen it in the news - 40 million credit... Read More
Before we start, I want to make it clear that... Read More
Internet Security |