Meyer & Bardill, LLC

Meyer & Bardill, LLC Meyer & Bardill, LLC zealously represents individuals and small businesses in legal disputes. We're your voice in court!

LL Bean children's insulated water bottles have been recalled due to possible lead contamination. The hazardous 13.5-oun...
07/22/2016
GSI Outdoors Recalls Children’s Water Bottles Due to Violation of Lead Standard; Sold...

LL Bean children's insulated water bottles have been recalled due to possible lead contamination. The hazardous 13.5-ounce bottles have color prints of Dino Bones, Flower Power, Orange Grid camo, Purple Tie Dye Butterfly, and Robo Shark. Consumers should immediately stop using the recalled water bottles and contact L.L.Bean for a full refund.

http://www.cpsc.gov/en/Recalls/2016/GSI-Outdoors-Recalls-Childrens-Water-Bottles/#remedy

The lead solder exterior base of the bottles contains high levels of lead, which is toxic if ingested by young children can can cause adverse health issues.

If you've swiped a card at a Walmart lately, keep an eye on your statements. In just the last few weeks, card skimmers —...
05/27/2016
Card Skimmers Found On Walmart Self-Checkout Terminals In Two States

If you've swiped a card at a Walmart lately, keep an eye on your statements. In just the last few weeks, card skimmers — devices that illegally scan customers’ credit cards –have been found at two different Walmart stores. The skimmers in these cases were so convincing that they may have been in place for weeks for being discovered

In just the last few weeks, card skimmers — devices that illegally scan customers’ credit cards –have been found at two different Walmart stores. The skimmers in these cases were …

More things to worry about in the cyber world. Be careful before you click the "unsubscribe" link in those annoying spam...
05/24/2016
Beware the Unsubscribe Scam | Cybersecurity | Articles | ID Theft Blog

More things to worry about in the cyber world. Be careful before you click the "unsubscribe" link in those annoying spam emails. The link may turn out to take you to a malicious website. Always make sure the sender is a legitimate company and the link goes to the company's website. If you're not sure, just mark it as spam and let your spam filter handle it.

Spam emails are one of life’s great annoyances, but they’re a pretty much a given in the digital age. At best these emails offer you products you don’t want, but at worst they can be attempts to steal your identity or your money.

If you are a LinkedIn member, even if you are not active, be sure to read this post from LinkedIn about continuing dange...
05/24/2016
Protecting Our Members

If you are a LinkedIn member, even if you are not active, be sure to read this post from LinkedIn about continuing danger from the 2012 data breach that leaked millions of users' email addresses and passwords.

Remember: Change your passwords on social networking platforms on a regular basis. Even if you provided no financial information to the site, hackers can use the personal information in your social network accounts (such as Facebook, LinkedIn, Instagram, etc.) to hack into other accounts or direct attacks at your friends. Help keep everyone safe!

https://blog.linkedin.com/2016/05/18/protecting-our-members

In 2012, LinkedIn was the victim of an unauthorized access and disclosure of some members' passwords. At the time, our immediate response included a mandatory password reset for all accounts we believed were compromised as a result of the unauthorized disclosure. Additionally, we advised all members...

In the next two years, 77% of property and casualty insurers will be using big data sources for underwriting purposes. W...
05/02/2016

In the next two years, 77% of property and casualty insurers will be using big data sources for underwriting purposes. Where will they be getting their information from? Telematics data (vehicle usage data), agent and customer interactions (especially Web, clickstream, phone, and email data), smart-home data, and social media. Data brokers gather vast amounts of Information from social media, emails, Google searches, mobile phones, web surfing, etc. They sell this data to, among others, insurers that will use the information to decide whether to insure your property and how much to charge you. How good are you at protecting your privacy? Will information from your social media and internet footprint be accurate? If you think internet privacy is only for the "bad guys," think again.

Source: http://blog.willis.com/2016/04/how-pc-insurers-are-using-or-plan-to-use-big-data/#sthash.4jP4ZyW6.dpuf

Adobe Flash software gets more and more dangerous. I'm truly shocked that developers continue to use it. If you have to ...
04/29/2016
Scam of the day update – April 12, 2016 – Adobe Flash update

Adobe Flash software gets more and more dangerous. I'm truly shocked that developers continue to use it. If you have to have it, make sure you update it religiously.

In April 9th’s Scam of the day, I explained to you about the extreme danger of ransomware posed by further use of Adobe Flash software without updating the software with the latest security u…

If you're trying to keep something private, don't use a cell phone. http://ow.ly/4n1D50
04/24/2016
Hacking Your Phone

If you're trying to keep something private, don't use a cell phone. http://ow.ly/4n1D50

Sharyn Alfonsi reports on how cellphones and mobile phone networks are vulnerable to hacking

Did you know that the IRS Taxpayer Advocacy Service is an independent organization within the IRS to help taxpayers? htt...
04/21/2016
Taxpayer Advocate Service

Did you know that the IRS Taxpayer Advocacy Service is an independent organization within the IRS to help taxpayers? http://ow.ly/4mWIQe

The Taxpayer Advocate Service (TAS) is your voice at the IRS. We ensure you are treated fairly, and know and understand your rights. If you are...

Consumer Reports: How much can you learn from state medical board websites? Not very much. See your state ratings. http:...
03/29/2016
Patient Safety | Consumers Union

Consumer Reports: How much can you learn from state medical board websites? Not very much. See your state ratings. http://ow.ly/103k6p

Seeking Doctor Information Online: Consumer Reports Safe Patient Project and the Informed Patient Institute analyzed the websites of 65 state...

Thieves used to steal their victims' identities by physically taking their mail, social security cards, or driver's lice...
03/28/2016
identity theft Danger - Trojan Horses

Thieves used to steal their victims' identities by physically taking their mail, social security cards, or driver's licenses. The Internet means identity theft can be done on a massive scale. We often hear of high-profile data breaches involving big corporations, but thieves also attack individual computers by the thousands. One of the most common forms of attack is the Trojan Horse. Learn more about this insidious malware and what you can do to protect yourself from it.
http://www.mebarlaw.com/news/2016/3/28/trojan-horse-risks

Thieves used to steal their victims' identities by physically taking their mail, social security cards, or driver's licenses. The Internet means identity theft can take place on a massive scale. We often hear of high-profile data breaches involving big corporations, but thieves also attack individua…

This is a great series about some of the most important Supreme Court decisions in history. These cases shaped constitut...
03/26/2016
C-SPAN Landmark Cases | Home

This is a great series about some of the most important Supreme Court decisions in history. These cases shaped constitutional law in fundamental ways that still impact our lives. Watch on C-SPAN or see them online at http://landmarkcases.c-span.org/default.aspx.

Landmark Cases explores the human stories and constitutional dramas behind some of the most significant and frequently cited decisions in the...

Your prescription medicine bottles can expose you to #idtheft. Always remove and shred the labels. #idtheft #privacy htt...
03/25/2016
Medical Identity Theft

Your prescription medicine bottles can expose you to #idtheft. Always remove and shred the labels. #idtheft #privacy http://ow.ly/ZWf9a

Always remove and destroy the labels before recycling your prescription medication bottles. There is enough information on the label to allow a...

Scam Alert! Need a locksmith in an emergency? Don't assume the Google listings are all trained, insured professionals. S...
03/16/2016
Fake Online Locksmiths May Be Out to Pick Your Pocket, Too

Scam Alert! Need a locksmith in an emergency? Don't assume the Google listings are all trained, insured professionals. Scammers operate websites known as lead generators (or lead-gens). The Google listing looks like a genuine locksmith business, and even shows a local business location (faked on Google maps). In reality, the business is just a call center, probably in another country, that dispatches poorly trained local subcontractors to your home or vehicle. Although the Google listings will advertise a low price, these fake locksmiths will jack up the price for their work. Remember, Google Adwords for locksmiths can cost $30 per click, so don't fall for the $19.99 special.

How to protect yourself? It's not easy to separate the locksmithing sheep from the lead-gen goats on a Google listing because these lead-gens are experts at gaming the system. Check the Better Business Bureau ratings, use a service like Angie's List, or contact a state locksmith trade association to find qualified members. Also, it's not just locksmiths, garage door repair, carpet cleaning, moving, and home security services are also vulnerable to this scam. #scams #consumerprotection

http://www.nytimes.com/2016/01/31/business/fake-online-locksmiths-may-be-out-to-pick-your-pocket-too.html

Odds are good that when you search Google for someone to help you get into your home or car, results will include poorly trained subcontractors who will squeeze you for cash.

03/15/2016
Online Reviews and Recommendations

The blogs, magazines, and reviews on which you depend in making purchasing decisions may not be as reliable as you think. Marketers are supposed to inform readers if they gave something of value to an endorser for the review; however, most do not. Case in point: Lord & Taylor settled FTC charges that it "deceived consumers by paying for native advertisements, including a seemingly objective article in the online publication Nylon and a Nylon Instagram post, without disclosing that the posts were paid promotions." The complaint also alleged that the high-end retailer paid 50 online fashion “influencers” to post Instagram pictures of themselves wearing a dress from the store's new collection. Neither Lord & Taylor nor the influencers disclosed that the retailer had given the dresses to the influencers and paid them thousands of dollars for their endorsements. Lord & Taylor also pre-approved each post, which was required to include the @lordandtaylor user designation.

The lesson to be learned, as always, is to investigate each endorsement or review before making major purchasing decisions. The marketing influence of "style makers" is getting more insidious all the time. Some video advice from the FTC:
#falseadvertising #ftc #fraud
http://bcove.me/ej2d6dww

This video describes how consumers can evaluate online reviews and recommendations when shopping.

Just because you use a Mac, don't think you're not vulnerable to malware and hacker attacks. Security experts have repor...
03/14/2016
Mac ‘Ransomware’ Attack Exposes Vulnerability of Apple Users

Just because you use a Mac, don't think you're not vulnerable to malware and hacker attacks. Security experts have reported the first successful ransomware involving Macs. Ransomware is a type of malware that restricts access to the infected computer system (such as by encrypting all of its files) and demands that the user pay a ransom to the hackers to remove the restriction. Users who downloaded Transmission v. 2.90, a legitimate BitTorrent client app, were infected with the ransomware called KeRanger. Apple has already fixed this vulnerability, but this should be a warning to all Mac Users that no one is completely safe.

To protect yourself from malware as much as possible:
1. Be careful about the software you download. For unfamiliar software, always investigate the developer and the software before downloading it.
2. Make sure XProtect, Apple's anti-malware application, is enabled on your computer.
3. Don't ignore those annoying software update notifications. The OS software updates are critical to keep your computer safe. Install updates as quickly as possible. Check for pending updates in the App Store by selecting the Updates tab and clicking Update All. Better still, enable automatic updates in your System Preferences > App Store. Select “Download newly available updates in the background” to keep your computer up-to-date.
4. Never click on links or download files in emails from strangers.

Four Reasons Not to Pay Up in a Ransomware Attack.
http://www.infoworld.com/article/3043197/security/4-reasons-not-to-pay-up-in-a-ransomware-attack.html

http://www.nytimes.com/2016/03/08/business/mac-ransomware-attack-exposes-vulnerability-of-apple-users.html?partner=rss&emc=rss&_r=1

The infected software affected a relatively small number of people over the weekend, but it pierces an image of safety long enjoyed by fans of the brand.

Paying for stuff with your cell phone is convenient, easy, and fun, but it also exposes you to hidden dangers if you are...
03/10/2016
Mobile Payments

Paying for stuff with your cell phone is convenient, easy, and fun, but it also exposes you to hidden dangers if you aren't careful. The Consumer Federation explains how mobile payments work and how you can protect yourself and your money. The big 5 tips:
1. Lock your device with a passcode or fingerprint scan.
2. Beware of Malware that can steal your personal information.
3. Public Wi-Fi hot spots are usually not secure. Avoid making payments while connected to them.
4. Keep the payment app software updated.
5. Check the app's privacy policy to see what information it can get from your phone.
#consumerlaw #privacy #security

Did you know that now you can use a smartphone, tablet, or other mobile devices to pay for some purchases? Mobile payments can be convenient – no need to write a check or to pull out your wallet for cash or plastic. No need to type in your payment information to buy something online. But are mobile…

Facebook Scams – "Like-Farming" http://www.mebarlaw.com/news/facebook-like-farming-scams
03/08/2016
Facebook Scams – "Like-Farming"

Facebook Scams – "Like-Farming" http://www.mebarlaw.com/news/facebook-like-farming-scams

Now that Facebook has expanded the popular “like” button to include other
reactions, it’s a good time to ask, “Can ‘liking’ and ‘sharing’ Facebook
posts and pages be hazardous to your digital health?” Sadly, the answer is,
“Yes”. Scammers and unethical advertisers use these popular posts and pages
to take advantage of unsuspecting users to gather personal information,
steal identities, and spread malware.

Facebook Scams – "Like-Farming" http://www.mebarlaw.com/news/facebook-like-farming-scams
03/08/2016
Facebook Scams – "Like-Farming"

Facebook Scams – "Like-Farming" http://www.mebarlaw.com/news/facebook-like-farming-scams

Now that Facebook has expanded the popular “like” button to include other
reactions, it’s a good time to ask, “Can ‘liking’ and ‘sharing’ Facebook
posts and pages be hazardous to your digital health?” Sadly, the answer is,
“Yes”. Scammers and unethical advertisers use these popular posts and pages
to take advantage of unsuspecting users to gather personal information,
steal identities, and spread malware.

Scam of the day – March 7, 2016 – Bank of America phishing scam
03/07/2016
Scam of the day – March 7, 2016 – Bank of America phishing scam

Scam of the day – March 7, 2016 – Bank of America phishing scam

Here is another good example of a phishing email that is presently being circulated.   It makes for compelling reading, but it is a scam.  Phishing emails, by which scammers and identity thieves at…

More warnings about how the Internet of Things can expose consumers to unforeseen dangers. Before you buy wireless-conne...
03/07/2016
How the 'Internet of Things' could be fatal

More warnings about how the Internet of Things can expose consumers to unforeseen dangers. Before you buy wireless-connected appliances (especially medical devices), investigate the security features that protect you from hacking and software bugs. The more important the device, the more you have to be vigilant.

IoT promises a more connected world, but with that come new opportunities for hackers to take control of our most personal devices.

Good advice from Consumer Reports on how to avoid getting scammed by "phishing email" scams. Don't trust an email that a...
03/03/2016
Social Security Email Scam

Good advice from Consumer Reports on how to avoid getting scammed by "phishing email" scams. Don't trust an email that asks for personsal information without making sure it is legitimate.

A fake Social Security email is being sent by scammers to try to steal your personal information. Consumer Reports shows how to spot this phishing attempt.

02/29/2016

Companies too often send personal medical information using unsecured email or websites, allowing unauthorized people to obtain this data. Georgia HB 1075 is a step towards helping protect Georgia consumers from medical identity theft. The transmission of a person's medical information to third parties without consent would be deemed an unfair and deceptive practice, allowing the patient to recover damages. The bill has little chance of passing this legislative session at this point. But kudos to the author of the bill, Lee Hawkins (R. Gainesville), and the other sponsors, including Sharon Cooper (R. E. Cobb) for starting the process. #medicalidentitytheft #identitytheft #georgialegislature

Since 1995, taxpayers have shouldered $7 billion in taxpayer subsidies to stadium facilities for National Football Leagu...
02/29/2016
Georgia Legislative Navigator

Since 1995, taxpayers have shouldered $7 billion in taxpayer subsidies to stadium facilities for National Football League franchises, with additional taxpayer subsidies to build stadiums for NBA, MBL, and NHL franchises. The owners these teams have engaged in a pattern of municipal extortion, threatening to relocate their teams to cities that will provide them with the greatest taxpayer subsidy. The only way to stop this corporate welfare is for the states to agree not to succumb to the pressure.

The "Compact Among the States to Prohibit Public Financing of Professional Stadiums" (Ga. SB 408) aims to do just that. The bill authorizes the governor to enter into interstate compacts that would prohibit state and local governments from subsidizing stadium facilities for the Big 4 sports leagues. Urge your state senator to vote on this bill. #gasenate #corporatewelfare #joshmckoon #judsonhill

http://legislativenavigator.myajc.com/#bills/SB/408

The actions of the General Assembly impact all Georgians. The AJC is proud to offer this tool to track legislation and lawmakers at the Gold Dome.

Address

1827 Powers Ferry Rd, Bldg 6, Ste 301
Atlanta, GA
30339

Alerts

Be the first to know and let us send you an email when Meyer & Bardill, LLC posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Meyer & Bardill, LLC:

Nearby law practices


Other Lawyers & Law Firms in Atlanta

Show All