Ask for Non-RFID Credit Cards

(Image used under: Creative Commons 3.0 [SRC])

The Consumerist reports that one of their readers asked for a non-RFID credit card from American Express. Granted, they only disabled contactless transactions in their database and did not issue him a spychip-free card, but one of the commenters said that they were able to do so with Washington Mutual.

It never hurts to ask, but it can certainly hurt to not.

Of course, you could just physically disable the RFID with a hammer, drill, or knife.

Tags: ,

RIAA Fighting to Stay Away From A Jury Trial

RIAA
(Image used under: Fair Use doctrine)

From Ars Technica:

The over 20,000 file-sharing lawsuits that have been filed over the past few years share a single distinction: not one of them has made it to trial. The RIAA is trying to keep Virgin Records, et al v. Jammie Thomas from a jury trial, filing a motion for summary adjudication on some specific aspects of the case.

A loss at trial would be even more catastrophic for the RIAA. It would give other defense attorneys a winning template while exposing the weaknesses of the RIAA's arguments. It would also prove costly from a financial standpoint, as the RIAA would have to foot the legal expenses for both itself and the defendant. Most of all, it would set an unwelcomed precedent: over 20,000 lawsuits filed and the RIAA loses the first one to go to a jury.

That pretty much sums it up. It would be so cool to see them lose. I wonder if the people who settled previously could join a class action lawsuit against them. Probably not, but that would be nice.

Tags: ,

DRM Roundup by Cory Doctorow

(Image used under: Creative Commons 2.0 [SRC])

Stolen from Schneier (but always credited), three articles by Cory Doctorow on DRM. My favorite tag line:

Digital rights management is a lie concocted to bilk the entertainment industry out of a fortune - it's time to wake up.

That is the truth. I could almost feel sorry for the industry, if they weren't using copyright lawsuits.

Cory is a guy who gets it:

Not one of them has ever stopped the widespread, unauthorised copying of media. Not one of them ever will.

Sounds like something something I might have said once. You would think these companies have at least one IT person both smart enough to realize this and gutsy enough to tell management.

Tags: ,

RARE! A Bill In Congress With No Drawbacks? Cell Phone Companies Cringe

(Image is in the Public Domain)

From the Consumerist:

Early Termination Fees: FCC regulations would require companies to prorate ETFs, with the penalty for escaping a 2-year contract cut in half at the end of the first year.

Service Maps: Cellphone companies would be required to provide detailed maps showing call quality down to the street level. The maps would be augmented by data on dropped calls and coverage gaps collected and publicized by the FCC.

Fee Disclosure: Overage charges would be displayed separately from taxes, and companies would be prohibited from levying any fees, apart from the basic service charge, not expressly authorized by federal, state, or local regulation.

Contract Disclosure: Depriving us of a source of many posts, companies would be prohibited from extending contracts without "point-of-sale notification," and customers would have 30 days to cancel any contract, new or extended. Any contract changes would need to be sent to consumers in writing, and could not take affect for 30 days.

Unlocked Phones: The bill would give the FCC a homework assignment: a single-spaced report to Congress on the harmful and anti-competitive practice of locking handsets.

Military Exemptions: Companies would be required to release military members awaiting deployment from their contracts.

Wow. I can't remember the last time I saw a consumer friendly bill that didn't have some horrible drawback attached. No custom fees? Prorated early termination fees? Street level service maps! So very cool… Let's hope for the best.

Tags: , ,

Customer Service Done Right – A DHL Story

DHL
(Image is in the Public Domain)

It's nice to hear that sometimes, companies can still get it right. I wish Comcast were more like this.

Tags: ,

RFID Implants May Be Linked to Cancer

(Image used under: Creative Commons 2.0 [SRC])

From the Washington Post:

When the U.S. Food and Drug Administration approved implanting microchips in humans, the manufacturer said it would save lives, letting doctors scan the tiny transponders to access patients' medical records almost instantly. The FDA found "reasonable assurance" the device was safe, and a sub-agency even called it one of 2005's top "innovative technologies."

But neither the company nor the regulators publicly mentioned this: A series of veterinary and toxicology studies, dating to the mid-1990s, stated that chip implants had "induced" malignant tumors in some lab mice and rats.

The FDA's not talking and anyone else involved says they hadn't read the study. Given that it's the FDA's job to find relevant studies and that the studies about the cancer link were widely available, it seems they're dropping the ball.

Tags: , ,

After 6 Years and Tons of False Posittives, the TSA No-Fly List Caught One! (OK, Not Really)

(Image is in the Public Domain)

Reading the wikipedia page, you can find that the No-fly list was implemented on 9/11 2001 and ballooned from 16 names to over 40,000. There have been many false positives including children and some famous people (fortunately some of whom are congress members).

According to this story, all the millions of dollars, the time wasted, and the frustration cast doubt whether the program was worth it. The man described in this article is actually Gerry Adams, a spokesman for the Irish Republican Movement.

It's because of suspected past ties to the IRA that he has been flagged eternally for extra security checks and constant harrassment. Read the story for a well written example of such which includes this awesome quote:

I hand the FBI young gun a copy of my travel schedule – a document that has been in the possession of the US state department for the past month or so.

"Huh," he says. "Why are you going to the White House, sir?"

"To see the president."

"Huh. Why?"

"He asked me," I say evenly.

Tags: , ,

File-sharing Might Be a Bigger Risk than You Think

(Image is in the Public Domain)

In case you didn't know already, if you don't set up your filesharing software right or if there's a coding error that allows the program to be exploited, random people on the Internet might be able to browse around on your computer. What would they want? Perhaps banking information, personal data, access to your tax records.

If you're going to fileshare, learn a little about the program you plan to use first.

Tags:

Part of The PATRIOT Act Struck Down by Court – Finally

George W. Bush
(Image used under: Fair Use doctrine)

Part of the Patriot act allowed the feds to issue "National Security Letters" which could demand information without subpoena, without probable cause, and included a gag order requiring that the recipient could not share that they'd received such a letter with anyone.

Despite this being a gross over-stepping of power, Congress did pass AND RENEW the Patriot act. All that aside, a federal judge finally struck the provision as unconstitutional.

Although Marrero recognizes the importance of preserving national security, he asserts in his decision that "The Constitution was designed so that the dangers of any given moment would never suffice as justification for discarding fundamental individual liberties or circumscribing the judiciary's unique role under our governmental system in protecting those liberties and upholding the rule of law."
Tags: ,

Department of Homeland Security Dumps $42 Million Failed Data-Mining Project

DHL
(Image is in the Public Domain)

In what has become the norm and not the exception, an expensive Department of Defense project has been shown to be a complete failure wasting millions of dollars and all of our time. What makes this story interesting is it was due in no small part to the efforts of the Government Accountability office that this project was scrapped. They discovered that the program was using live data on American citizens instead of dummy data and that none of the required privacy protections had been put in place. Go figure.

Most frightening is this line:

The privacy office concluded that although required privacy analyses were ignored, the Privacy Act was not technically violated because the live data were covered by privacy notices issued earlier for other programs that originally gathered the information.

Which demonstrates the danger of taking data for one reason, but using for a completely different reason altogether.

Tags: , , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]