Digital Copiers Loaded With Secrets

Identity theft      I was absolutely blown away by the CBS News Report on the danger of digital copy machines to your security. Digital copy machines manufactured after 2002 all contain hard drives which take a picture of every document that they scan, print, copy and e-mail.  When the machine is put on the used copier market, it can be purchased by anyone.  The data on the hard drive can be read by generic software which is found free on the Internet.  

    The data can include anything from copies of a grocery list to your social security number and sensitive medical information.  Encryption software is available and can be installed on these copiers but if the users don't know that (1) there is a hard drive and (2) the software is available, how can they protect the unwary public from this risk of identity theft?

    Watch this CBS Investigative story.  You'll be as blown away as I was.

Related articles:

Buffalo News: Police Data on Copiers Causes City to Scramble

Buffalo News: Scrub Copiers' Memories Before Discarding

Legal Holds and Trigger Events Blog: Copier Hard Drives Pose Preservation Problem

PR Log: How to Protect Your Photocopier Hard Drive

Questions? Concerns? 

For a Free Consultation please contact Attorney Lowell Steiger immediately at

(323) 852-1100

lowell@steigerlaw.com

Skype (with or without video): Lowell_Steiger

"Treated With the Respect and Understanding That You Deserve"

Internet Crime: Fraudsters on Social Networking Sites

Social-networking-sites     The FBI's Internet Crime Complaint Center has prepared a report entitled "Techniques Used by Fraudsters on Social Networking Sites."  Basically, the fraudsters hijack accounts in order to spread malicious software  via various techniques:

  • Use of spam to promote phishing sites, claiming a violation of terms of agreement or some other issue that needs to be resolved
  • Asking you to download an application or view a video
  • Some spam appears to come from a friend's e-mail, thereby giving the appearance of legitimacy
  • Some involve applications advertised on social networking sites, again giving the appearance of legitimacy.  

Mommy's fraudster

INFECTION!

Once the victim responds to the phishing site, downloads the application, clicks the video or link, their computer, telephone or other digital device becomes infected. Others install malicious code or rogue anti-virus software.  Yet others give the fraudsters access to your profile and personal information and begin sending messages to your "friends" list instructing them to install the new application, too!!!


PROTECT YOURSELF! TIPS ON AVOIDING THESE TACTICS

The IC3 has graciously provided the following tips to avoid these tactics:

  • Adjust Web site privacy settings to help protect your identity
  • Computer thiefBe selective of your friends because your "friends" can access any info marked as "viewable by all friends"
  • Provide only limited access to your profile to those with whom you don't feel comfortable sharing personal information
  • Disable options and then open them one by one such as texting, photos sharing, etc.  If you're using the site only to keep in touch with people, it may be better to turn off the extra options that won't be used
  • Be careful what you click on.  Posting a link or video to someone's wall doesn't insure that it's safe
  • Familiarize yourself with the site's policies and procedures.  Check their FAQ's.

If you experience a fraudster type incident, report it to www.IC3.gov


If you, or someone you know, has been injured in an accident, please contact me immediately at

(323) 852-1100

lowell@steigerlaw.com

Skype (with or without video): Lowell_Steiger

"Treated With the Respect That You Deserve"