About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • Credit Card Theft

    How to Avoid Credit Card Theft while Traveling

    Identity Theft 

    Whether you plan to travel now or in a year, you should take steps to protect yourself from identity theft and credit card fraud while you’re on vacation. Tourists are often victims of theft, including passport and credit card theft—both of which can compromise personal information. Thieves can gain data by physically taking belongings the old-fashioned way or by hacking into your phone or computer. By following these six tips before and after you travel, you could […]

  • Hacking: Winter Olympics Are Targeted with Custom Exploit

    Data Security Technology 

    The Winter Olympics in Pyeongchang, South Korea start next month and hackers are using the pretext of the games to launch phishing attacks featuring custom malware that, if downloaded, allows an attacker to take control of a device. McAffee has named the malware “Operation PowerShell Olympics,” which was discovered in December when it was sent to Olympics staff members responsible for the ice hockey competition. Thus far, the attack seems to be focused on individuals […]

  • Identity Theft and the New Tax Bill

    Identity Theft 

    The 2017 filing season could be the worst yet for tax-related crime. With widespread confusion about the new tax law, IRS budget cuts, and a record-breaking year for data compromises, there’s an opening for fraud that should be serious cause for alarm, but doesn’t seem to be. The bottom line: you should be concerned. Last tax year, the IRS stopped 787,000 confirmed identity theft returns, totaling more than $4 billion. For the same nine-month period in 2015, […]

  • computer nightmare

    2018 Will Be a Cybersecurity Nightmare

    Data Security Identity Theft 

    If you think 2017 was bad, hold on for dear life because 2018 is going to be the worst yet when it comes to cyberattacks. The astounding amount of personal information “out there” coupled with criminal innovation will allow cyber incursions of unprecedented scale and sophistication. There is a confluence of intractable forces informing this prediction. First, the headline-grabbing data breaches of 2017 cap a five-year run of hackers relentlessly gutting databases containing personally identifiable information (PII). Who’s been breached? High-profile […]

  • Apple Admits All Devices Affected by Meltdown and Spectre Flaws

    Data Security Technology 

    Apple admitted yesterday that all Macs and iOS devices are affected by the Meltdown and Spectre chip bugs, a massive vulnerability that was discovered by Project Zero, a team of security analysts employed by Google tasked with finding zero-day vulnerabilities. While it was assumed among cybersecurity experts that the vulnerability extended to Apple, the announcement confirmed it. At issue are processes at the deepest level of a personal computer’s operations where certain anticipatory commands—basically an […]

  • The Meltdown and Spectre Vulnerability is Serious (Sorta)

    Data Security 

    The Meltdown and Spectre vulnerabilities that were revealed after the New Year have been the talk of the cybercommunity, and for good reason. The problem, if exploited, would be capable of breaking down basic security partitions by targeting a design feature in chips manufactured by Intel, AMD and ARM. First, don’t panic. The vulnerability may have existed for 20 years. Researchers have (so far) found no example of it being used. However, now that the […]

  • Making Asia Insecure One Machine at a Time

    Data Security 

    Owned by the Alibaba Group, the UC Browser was developed by the Chinese mobile Internet company UCWeb to compete with Google’s Chrome browser, and it’s doing just that, specifically on lower-end smartphones that are dominating Asian markets. Size is everything here. Most phones in the emerging markets of Asia have between 8 and 12 GB of storage—compared to phones sold in the US, which typically start at 32 GB. That means the size of programs […]

  • selling personal data

    Reader’s Digest Magazine Settles Privacy Tort in Michigan

    Privacy 

    In a lawsuit that may be a harbinger of similar claims against companies that sell personal information to third parties (regardless of existing laws), Reader’s Digest has agreed to pay $8.2 million to settle a class action suit in Michigan. Michigan law prohibits the disclosure to a third party personal information that connects an individual to the purchase of specific media—written media for the most part, but the law extends to video and audio recordings […]

  • FCC Promotes Repeal of Net Neutrality with Dead People

    Identity Theft 

    It would be funny if it weren’t for the fact that it may be true that, in the face of bipartisan pushback, the FCC has gotten into the propaganda game. A Reddit entry sums up the issue nicely: “FCC has been using dead peoples accounts to shill for ending Net Neutrality.” The repeal of net neutrality, which happened on December 14, means that telecom companies can now charge more (in theory, whatever they like), throttle […]

  • hiding hacks

    It’s Getting Harder to Hide Hacks

    Data Security 

    The Uber hack was an object lesson in the perils of trusting a company to report a data compromise in a timely way, which is why a new hack notification workaround developed by a cybersecurity firm is newsworthy. Cybersecurity firm Tripwire has figured out a way to detect unreported compromises. The impulse to hide evidence of an attack, and keep things mum for as long as possible in the event one happens is strong. Uber […]

LOAD MORE ARTICLES