Category: Internet Safety


Digital Copiers Loaded With Secrets

Author: Lowell Steiger

Published On: May 13, 2010

I was absolutely blown away by the CBS News Report on the danger of digital copy machines to your security. Digital copy machines manufactured after 2002 all contain hard drives which take a picture of every document that they scan, print, copy and e-mail. When the machine is put on the used copier market, it can be purchased by anyone. The data on the hard drive can be read by generic software which is found free on the Internet. The data can include anything from copies of a grocery list to your social security number and sensitive medical information. Encryption… Read More

Chatroulette is Shockingly (Fill in the Blank) – Is It Legal?

Author: Lowell Steiger

Published On: May 13, 2010

What is ChatRoulette?  Sam Anderson describes it perfectly as “a new website that brings you face-to-face, via webcam, with an endless stream of random strangers all over the world” in his New York Magazine article The Human Shuffle.  I stumbled upon www.chatroulette.com quite by accident when perusing www.oddee.com and found 18 Funny ChatRoulette Screenshots. While I don’t think they were necessarily funny, they were quite interesting. Screenshots ranged from a justifiably angry African-American fellow being linked up with a young Arian whose room was adorned with a Nazi Swastika flag (not funny) to a young woman screaming in horror when her chat partner donned a humorously terrifying mask. What is this… Read More

Internet Crime: Fraudsters on Social Networking Sites

Author: Lowell Steiger

Published On: October 1, 2009

The FBI’s Internet Crime Complaint Center has prepared a report entitled “Techniques Used by Fraudsters on Social Networking Sites.” Basically, the fraudsters hijack accounts in order to spread malicious software via various techniques: Use of spam to promote phishing sites, claiming a violation of terms of agreement or some other issue that needs to be resolved Asking you to download an application or view a video Some spam appears to come from a friend’s e-mail, thereby giving the appearance of legitimacy Some involve applications advertised on social networking sites, again giving the appearance of legitimacy. INFECTION! Once the victim responds to the phishing site, downloads the application, clicks the video… Read More

Follow Us