The perils of Metadata in documents



Loose lips sink ships, so the old saying goes. These days documents are emailed back and forth and many times, revisions are made to “polite the text” up or “sanitize” or “redact sensitive information”. With many file formats though, the metadata about the revisions (or even the old versions of the data itself) are still there. The Security Fix has a great article on the topic today.


I remember a story several years ago about businesses being burned by revision changes that still existed in the Word document that was mailed out. (Application letters that had been changed for several employers/position availabilities with salary info/interoffice memos with poorly chosen comments about coworkers/bosses and even security breaches of sensitive information.)

What to do???? Brian gives some good links to Adobe’s site and information on finding metadata in pdf documents, Microsofts how-to find and remove meta-data for Microsoft Office documents, Harlan Carvey’s site on locating metadata in Windows and online (this link not currently working?) and a good freeware find…. Trace which is for finding documents with metadata online on an intranet, or on your pc. Like I said, this last one looks like a great piece of freeware.

It looks like the above are good reads for people that work with getting documents out to the public, or work in an organization that sends documents out to the world.

Related Posts

Blog Traffic Exchange Related Posts
  • How embarrasing... Computer security firms database hacked The Washington Times, has a story from Brian Krebs of their Security Fix blog about ... Guidance Software -- the leading provider of software used to diagnose hacker break-ins -- has itself been hacked, resulting in the exposure of financial and personal data connected to thousands of law enforcement officials......
  • Phisher's getting sneakier The SecurityFix reports on this clever two-factor authentication phishing attempt. They were looking for Citibank Business customers and in addition to username password information they were looking to verify a supplied token. The bottom line is that phishers will look to find any way possible to social engineer you out......
  • Leading browser coders get together on internet security This is one of those stories that you never thought you'd see (especially after the Microsoft-Netscape "wars")... Developers from four of the most prominent web browsers, Internet Explorer, Mozilla/Firefox, Opera and Konqueror (much of the foundations for Safari are in the Konqueror codebase)... have got together and talked about different......
Blog Traffic Exchange Related Websites
  • Instant Web Designs Are Able To Do The Distinction Websites have the ability to reflect your small business strength inside of a very lucid way. Additionally assist you mark your online presence inside the online business environment that's really very crucial in today's growingly competitive online market space. Whether it be an informative site or perhaps a site that......
  • Exploit Your Affiliate Product Sale With 11 Great Steps Affiliate Programs, are the major source of income for any online based business. The major concern in affiliate product marketing is converting the visitors into customers i.e., making the visitors to make a purchase or subscribe for a program etc. Here I would like to discuss the exploiting steps to......
  • Web Site Design And System: Staking The Island Inside An Sea Of Data If it were that easy then a internet is sure to have a great deal more websites up now than it already does. The strategy for one's website ought to be approached much being a chess game. Know how to position your pieces in a way to attain maximum benefit.......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site