About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • cybersecurity

    Forever 21 Suffers Breach, Underscores Cybersecurity Basics

    Data Security 

    Word started spreading yesterday the way it often does with cyber events, like fog. The sun burned through it quickly, in this instance, and we now know (sort of)…something happened. Forever 21 is still a little vague on specifics, but between March and October of this year, at least some of the company’s point-of-sale devices were vulnerable to attack. According to news reports, a 2015 encryption upgrade was either not installed or not delivered. The […]

  • SHIELD act

    New York AG Proposes Tougher Data Breach Laws

    Data Security Cybersecurity 

    Even though we haven’t passed the green flags of Thanksgiving, it’s beginning to look a lot like Christmas—at least for cybersecurity advocates. In this edition of “Someone’s Actually Paying attention,” New York State Attorney General Eric Schneiderman has introduced a bill that expands the definition of a breach in his state. The bill is called the Stop Hacks and Improve Electronic Security Act, or the SHIELD Act for short, and it already has the support […]

  • Secure email

    Can You Hack-Proof Your Personal Email Address?

    Data Security Swiped 

    How would you feel if the digital “you” were deleted? The common wisdom in cybersecurity circles is that if you think it can’t happen to you, it probably will. Consider Mat Honan’s story. “First my Google account was taken over, then deleted,” Honan wrote. “Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages.” Honan’s AppleID was used to remotely delete all the data on his iPhone, iPad, and […]

  • sex toy eavesdropping

    Buyer Beware: Your Smart Sex Toy Is Listening

    Privacy Technology 

    As if the recent news of every Tom, Dick and Harry out in Hollywood creeping on women in every way imaginable weren’t enough, now comes news that a smart sex toy manufacturer may have been caught creeping on consumers—specifically with a predilection to eavesdrop on lovers in mechanical delicto. The story comes via Reddit: A Lovense remote control vibrator app recorded sessions without the permission of at least one user. It was bound to happen […]

  • phishing

    Study: Phishing, Not Data Breaches Most Likely Cause of Account Takeover

    Data Security Technology 

    A recent Google study found that phishing exploits are far more likely to be the cause of account takeovers than the information compromised by data breaches. “Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials” was conducted in cooperation with the University of California, Berkeley and the International Computer Science Institute gathered data from March 2016 through March 2017. Sampling more than 1.9 billion stolen usernames and passwords exposed by past data breaches […]

  • selfie

    Facebook Says “Send Nudes.” Don’t.

    Privacy Technology 

    If a shady looking character told you to give him pictures of yourself naked, would you? How about a video? What if he told you that it was for your own good? Even if you have less sense than one of the rocks in Kim Jong-un’s head, you wouldn’t do it. Now what if Facebook asked you for nudes? According to The Verge, the social media giant is doing just that, piloting a program in […]

  • 5 Ways to Keep Your Personal Health Information Safe

    Data Security Privacy Identity Theft 

    Did members of the royal family go under the knife at an upscale London plastic surgery clinic? A recent hack at London Bridge Plastic Surgery may reveal the answer to that—and many other questions you never thought to ask. Setting aside the obvious follow-up questions (Do you care? Is it any of your business?) and regardless of your curiosity about seeing the picture proof of royal rearrangements, you should be paying attention. The hack speaks to our […]

  • phone - privacy killer

    Apple’s iPhone X could be the ultimate privacy killer

    Privacy 

    The odds you don’t know already know about Apple’s latest attempt at market domination — the iPhone X — are about even with the possibility that President Trump will stop using hand gestures when explaining something. That said, it is quite possible that you have not yet heard why the iPhone X should worry you. “In its continuing war on inconvenience,” Andy Greenberg of Wired wrote, Apple is poised to “give an unproven biometric security technology its […]

  • Spam

    Why Spam Is More Dangerous Than Ever

    Data Security Technology 

    Spam is supposed to be a thing of the past, but it’s not—and today it comes weaponized with manifold data-grabbing threats—from ransomware to keystroke recorders and beyond. Your email has never been more dangerous. There was a time in the early 2000s when email spam and malicious botnets were viewed as mere nuisances. A confident Bill Gates waved it away at the 2004 World Economic Forum in Davos, Switzerland: “Two years from now, spam will […]

  • 10 Things to Know about Credit Monitoring

    Personal Finance 

    The personal information of 143 million people was compromised in the recent Equifax data breach, and since then it seems like everyone and their dog is talking about protecting themselves with credit monitoring. If only it were that simple.   Credit monitoring services, like any service, have their pros and cons. Before you enroll in a monitoring service or decide to take it upon yourself to monitor your credit, check out the following 10 things […]

LOAD MORE ARTICLES