About Adam K Levin | Contact | Videos

Author Archives: Adam Levin


  • cyber-security

    5 Cyber-Security Myths We Need to DitchData Security, Technology

    Share

    Pick a subject, any subject, and there are myths and pure nonsense that someone will buy into. Birds will die if they eat the uncooked rice flung at newlyweds. (Nope) If you eat Mentos and drink Diet Coke simultaneously your stomach will explode. (Hardly) You only have one credit score. (Wrong) Napoleon was short. (At 5’ 6”, his height was average in his day). “President Obama was the founder of ISIS.” (Oh, come on Donald!) […]

  • The talk

    Gone Phishing? How to Talk to Your Kids About MalwareData Security, Technology

    Share

    Picture this: The car is full. You’re navigating by the side mirrors while doing a mental inventory of everything you packed and wondering if you are going to make it to the realtor’s office in time to pick up the keys for your vacation rental. You have absolutely no idea what the kids are doing in the back seat. Now forget the massive distraction of that summer road trip and consider the bigger picture. It […]

  • hackers election

    5 Ways Hackers Could Influence the ElectionData Security, Technology

    Share

    When Republican presidential nominee Donald J. Trump said he hoped the Russian government had found Hillary Clinton’s 30,000 missing emails, he wasn’t just taking a swipe at his opponent. He highlighted a very real and present danger to our democracy. While social media users were atwitter about whether or not The Donald had committed treason—for the record, he didn’t—I don’t know if his quasi-seditious braggadocio reveals anything about his loyalty to the country he hopes […]

  • Texting

    4 Things You Should Never Text or EmailIdentity Theft, Technology

    Share

    Most of us in our “instant gratification isn’t enough” society assume that the potential fallout from transmitting sensitive information via text, fax or email is outweighed by the convenience of getting something where it needs to be fast. After all, becoming the victim of an identity-related crime isn’t the end of the world, right? Define “End of the World” While it’s not technically the end of the world, you may find yourself wishing for it. […]

  • Texts you should ignore

    7 Texts You Should IgnoreTechnology

    Share

    Whether you’re trying to win tickets to a sold-out concert, remind your partner to buy milk, vote for your favorite reality TV personality or ask your headphones-encased kid a question, there’s a text for that. While texting is a great convenience and time saver (not to mention an international obsession), if you respond to a wrong text — think: Wyle E. Coyote and the Roadrunner — look out below! Phishing via text works the same […]

  • Phishing

    5 Recent Phishing Lures that Could Snag YouConsumer Protection, Identity Theft

    Share

    A recent study found that 70% of teens text and drive, largely due to FOMO (fear of missing out). These kids are ripe for phishing. But so are many of us. The distractions of life are a phishing campaign’s stock in trade. And while getting got by cybercrime will never be entirely avoidable, knowledge is your best protection. While it goes without saying that texting and driving is illegal, and inter-galactically stupid, it also makes […]

  • Summer vacation

    How Staying Off Social Media Can Keep You Safer & Happier This SummerSocial Media, Lifehacking

    Share

    Let’s face it, there’s no bigger downer than working all day and coming home to images of other people’s awesome vacations — that is, nothing except maybe coming home to find out you’ve been robbed or had your identity stolen. According the Pew Research Center, 65% of adults use social media, and among people aged 18 to 29, the percentage skyrockets to more than 90% of the population. For a family with kids, a staggering […]

  • How to Protect Your Identity While You’re Out of TownIdentity Theft

    Share

    hile it’s important to do everything you can to protect yourself from identity-related crime when you’re traveling, it’s equally important to do everything you can to protect your home and the breadcrumbs of your identity that you leave behind. Every possible kind of identity-related crime exists in a dormant state in your home. In more forms and places and files than you can possibly remember, sensitive personal information stays behind, and only you can protect […]

  • Password

    7 Steps to Safer Passwords for All Your Online AccountsPersonal Finance

    Share

    Some passwords are funny. Some are pretty weird. Some can be a math problem. Many can be laughably easy to hack (I give you “dadada, ”“qwerty,” “password” and”123qwe” to name a few.) — or very tricky. But one thing is for sure, they are never really 100% hack proof. Earlier this month, news broke that a significant number of Twitter passwords had been compromised and were being offered to anyone willing to fork over 10 […]

  • Identity theft

    A Scheme You’ve Never Heard of Might Ruin Your SummerIdentity Theft

    Share

    Legendary Supreme Court Justice Louis D. Brandeis said, “Publicity is justly commended as a remedy for social and industrial diseases. Sunlight is said to be the best of disinfectants; electric light the most efficient policeman.” Never were truer words spoken when it comes to protecting your identity. When it comes to synthetic identity theft, you have to be extra vigilant. Synthetic identity theft is committed in a variety of ways, ranging from simple (changing a […]

LOAD MORE ARTICLES