About Adam K Levin | Contact | Videos

Author Archives: Adam Levin


biometric scanner

Is It Time to Buy a Biometric Scanner?

Identity theft is still out there, keeping pace with the latest innovations and security measures, and snaring new victims every day. With the advent of cheaper, standalone, easy-to-integrate biometric technology for authentication, is it time to buy a fingerprint scanner? What’s a Biometric Scanner? Biometric technology uses physical or biological information, like a fingerprint, retinal scan or heartbeat, to authenticate a person’s identity. You can currently purchase the most commonplace biometric scanner — that is, […]

  • nigerian scam

    Why You Need to Know About This Nigerian Hacker Ring Targeting Small BusinessesData Security, Technology

    Nigerian 419 con artists have been around seemingly forever, relentlessly sucking funds out of the bank accounts of one duped individual victim at a time. You’ve probably heard of them. These gambits revolve around tricking the victim into thinking he or she can help transfer a large sum into a U.S. bank, and make a tidy profit on the side. But now some veteran Nigerian criminals have evolved–ripping off small- and medium-sized businesses on a […]

  • Why Tax Collection Scams Are Getting Harder to StopCybersecurity, Personal Finance

    I’ve written about tax-related crime for years, and have always offered this fail-safe rule to avoid tax scams: If you ever receive a call from the IRS about back taxes or any other money you supposedly owe the government, hang up because it’s a scam. There was something comforting about that advice — maybe even a little satisfying. I mean, who secretly doesn’t want to hang up on the taxman? But it seemed no amount […]

  • How Criminals Are Probing the Internet to Illicitly Control CompaniesData Security, Technology

    When a young Finnish programmer named Tatu Ylönen conjured up the Secure Shell (SSH) coding protocol in 1995, he had no inkling of the pivotal role his creation would play in the rapid evolution of network-centric commerce. And Ylönen certainly never imagined that one day he would be consumed with spreading awareness about a darker aspect of SSH: his protocol – or, more precisely, how SSH has come to be used as part of the […]

  • Easter scam

    6 Easter Scams You Want to AvoidConsumer Protection, Swiped

    Easter is a time for family, colorful parties and egg hunts, but sadly it also attracts scam artists looking to make a quick buck during the high-fructose corn syrup free-for-all. There are all stripes of Eastertime cons and scams waiting for you if you’re not paying attention — or even if you are. Some don’t really qualify as scams, whether we’re talking about those colorful plastic eggs for storing treats, sometimes loaded with lead paint, […]

  • Privacy

    Will We Ever Stop Bugging Ourselves?Privacy, Technology

    We live in an age of hackers. They are employed by our government and deployed by foreign powers. They are freelancers with goals ranging from netting big consulting fees in exchange for the discovery of potentially damaging vulnerabilities before they make the evening news, to sending a message, to righting a perceived wrong, to outright criminal activity. While the various hacker camps are different, they present the same conundrum to all of us: Is anything […]

  • vacation scam

    How to Enjoy Your Vacation Without Getting ScammedConsumer Protection, Identity Theft

    Spring has begun, which means open season on travelers who aren’t well-versed in the various scams waiting for them on the seamier side of paradise. While the scams abound, being forewarned is forearmed. Here are some typical scams that can ruin your vacation, drawn from my book Swiped: How to Protect Yourself in a World Filled with Scammers, Phishers, and Identity Thieves. 1. Asocial Media? One seldom publicized use of social media (at least in […]

  • credit card phone

    Here’s What to Do the Next Time a Business Asks for Your Credit Card by Phone or EmailCybersecurity, Personal Finance

    Recently, I was booking a hotel reservation for a family member and in the process was asked to provide certain information. It was a simple third-party credit card authorization. What could possibly go wrong? Plenty. Beyond the fact that I am professionally paranoid — I wrote a book about it — there are so many ways for your information to wind up in the wrong hands, especially your credit card information. When we provide our […]

  • phishing attack

    The Vice President Got Phished — Are You Next?Government, Cybersecurity

    America got mail this weekend, about 30 emails, according to reports. They were written as recently as last year by then-Governor Mike Pence and sent from his personal AOL account. While this is a political story, it is not about politics. It’s about a nationwide problem. The emails, released to the Indianapolis Star in response to a public records request, include state business. The revelation is that Pence used his private email account to conduct […]

  • immigration

    How Trump’s Immigration Policy Spurred a Deportation ScamGovernment

    For those who thought President Trump’s stance on immigration was the gossamer of election year overpromising, it’s time to adjust that thinking. The administration last week unveiled plans to target all “removable” aliens. It is a staggering number of people: 11 million. If I told you that Price Waterhouse blamed the envelope mix-up at the Oscars on a practical joke devised by Warren Beatty and provided a link to the story, would you click through? […]

LOAD MORE ARTICLES