About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • credit card phone

    Here’s What to Do the Next Time a Business Asks for Your Credit Card by Phone or Email

    Cybersecurity Personal Finance 

    Recently, I was booking a hotel reservation for a family member and in the process was asked to provide certain information. It was a simple third-party credit card authorization. What could possibly go wrong? Plenty. Beyond the fact that I am professionally paranoid — I wrote a book about it — there are so many ways for your information to wind up in the wrong hands, especially your credit card information. When we provide our […]

  • pacemaker

    Will hackers turn your lifesaving device into a life-threatening one?

    health care Technology 

    What seemed like a farfetched scenario out of Hollywood four years ago is now yet another reality that security experts have been warning about. In the screen version, the U.S. vice president is assassinated on the TV show “Homeland” after a hacker takes control of his pacemaker and stops his heart—making it look like a heart attack. In real life, the U.S. Food and Drug Administration recently released a safety warning that St. Jude Medical […]

  • healthcare

    What GOP Health Care Means for Your Wallet

    Government Personal Finance 

    Will you be better or worse off if Republicans pass their version of health care reform? That’s the burning question for most Americans as they watch the arm wrestling going on in Washington, D.C. As with the health care debate itself, there are no easy answers. The bill being debated right now, the American Health Care Act working its way through the House of Representatives, offers strong hints about what health insurance will look like when […]

  • CIA

    How bad is recent WikiLeaks document spill about CIA? Look beyond headlines

    Data Security Government 

    WikiLeaks got everyone’s attention again last week, with dire headlines proclaiming the entire American government spook infrastructure had just been decimated by the secret-smashing site. Julian Assange, true to form, has shared a little leaked data and promised a whole lot more. (“Less than 1%” has been shared, the site said in a tweet). The cache of stolen documents it published does have a media-friendly name, however: Vault7.Hold on to your hyperbole: There’s a lot […]

  • phishing attack

    The Vice President Got Phished — Are You Next?

    Government Cybersecurity 

    America got mail this weekend, about 30 emails, according to reports. They were written as recently as last year by then-Governor Mike Pence and sent from his personal AOL account. While this is a political story, it is not about politics. It’s about a nationwide problem. The emails, released to the Indianapolis Star in response to a public records request, include state business. The revelation is that Pence used his private email account to conduct […]

  • data breach

    Cyber attacks becoming big threat for small businesses

    Cybersecurity 

    Small and midsize businesses are increasingly at risk for data breach class-action lawsuits that typically have targeted large corporations. Large companies are learning to address cyber threats. Hackers are responding by setting their sights on SMBs. It’s simply more productive and efficient to attack poorly protected companies that could take weeks or even months to notice they’ve been breached. As the risk of exposure moves downstream, the associated class-action lawsuits surely will follow. Statistics from […]

  • immigration

    How Trump’s Immigration Policy Spurred a Deportation Scam

    Government 

    For those who thought President Trump’s stance on immigration was the gossamer of election year overpromising, it’s time to adjust that thinking. The administration last week unveiled plans to target all “removable” aliens. It is a staggering number of people: 11 million. If I told you that Price Waterhouse blamed the envelope mix-up at the Oscars on a practical joke devised by Warren Beatty and provided a link to the story, would you click through? […]

  • My Friend Cayla, similar toys may not be your child’s best friend

    Identity Theft Technology 

    Germany has taken steps to allay concerns about how the “Internet of Toys” could put children in harm’s way. This past December, consumer groups concerned with child safety petitioned the Federal Trade Commission to look into a hot new doll, named My Friend Cayla, and its counterpart marketed to boys, i-Que Intelligent Robot. Privacy advocates expressed concern about the dolls’ capacity to spy on children. And now German authorities have banned these two internet-connected toys […]

  • The Latest Way Fraudsters Are Abusing Personal Information

    Identity Theft 

    According to a 2016 report from the security firm ThreatMetrix, identity thieves are working a new seam in the identity theft gold mine: online lending. There is an increase in attacks against providers of alternative lending products. The reason online lenders have attracted this unwanted attention has to do with the niche they occupy. First, they typically offer smaller loans in the $2,000 to $5,000 range. They differentiate themselves in a crowded market by providing […]

  • Tax fraud

    How to Make Sure Someone Doesn’t Steal Your Tax Refund

    Personal Finance Identity Theft 

    Americans taxpayers are too lax about identity theft, according to CyberScout. A survey conducted by the data security and identity protection firm found more than half of Americans aren’t worried about tax fraud, despite federal reports showing identity thieves filed 787,000 fraudulent returns in 2016, which adds up to more than $4 billion in fraud. The survey also found that only 35% of taxpayers ask their preparers to use two-factor authentication (which is stronger than […]

LOAD MORE ARTICLES