Thursday, May 14, 2009

What in the World is Pod Slurping?

This sounds roughly teens party game, but under slurping not just blatant, this criminal.

Under surfers use portable storage devices such as IPod illegally downloading large amounts of data. Under surfers to connect directly to the desktop where data is held and may be inside the firewall. This puts companies at risk of abduction of data and human risk of abduction of personal information. With an estimated 123 million iPods and MP3 players that are transported, the potential threat is everywhere. iPods are not only devices that can be used to slurp your personal information.

Under surfers can access and slurp your personal information by:

* IPods and other MP3-players
* Mobile phones
* Digital Cameras
* PDA
* Finger discs
Other plug and pay of

Security expert Abe Usher, invented the term "under slurping" in 2005. Lloyd Dennys, publisher IPod fan site iPodlounge, said: "I see how easy it was to do" and added that it was a shame that such a low act of ill will press the "insanely great IPod".

These top-selling portable devices to store up to 80 gigabytes, and their storage load increased, their size decreased, making them less visible. In surfing puts people risk identity theft and a threat to companies and institutions. While companies and individuals to invest in antivirus programs and penetration of services in prevention, to stop the corporate and personal thieves from accessing data via the Internet, allows for slurping slurp private information from the USB-connection with an external computer.

How easy Pod-surfing?

* No one thinks that the right to see a person with IPod, camera, phone or other OSCHS.
* This is only minutes.
* This is a simple automated process that requires no technical knowledge.
* Small device for sub-surfing can be pocket-picking while they work.

Many reports on the pod surfing around possible scenarios, thieves dressed as a janitor and armed iPods. But soon we found that the surfing is not only possible, what is happening. Worker discontent certification under slurped and Excel spreadsheets of all employee salaries, and email them to all other employees. This and other cases to alarm companies.

Despite the fact that corporations and institutions, which, it seems that the most likely object of slurping person must also protect themselves against the risk of identity theft through the pod surfing.

Protection against identity theft with Pod Surfing

Under Users must have access to a computer to connect to the appliance is the best board computer available for others. Are you exit from your office or dorm room, or go from the cafe 'table recharge, remember only takes about one minute (at samom dele test in 65 seconds) download everything on your computer to IPod. This puts new perspective on "Ah, I just went to the minutes, does not it?

How to avoid data theft prevention begins with knowing all the ways identity thieves steal or slurp your personal information.

No comments: