About Adam K Levin | Contact | Videos

Author Archives: Adam Levin


  • selfie

    Facebook Says “Send Nudes.” Don’t.Privacy, Technology

    Share

    If a shady looking character told you to give him pictures of yourself naked, would you? How about a video? What if he told you that it was for your own good? Even if you have less sense than one of the rocks in Kim Jong-un’s head, you wouldn’t do it. Now what if Facebook asked you for nudes? According to The Verge, the social media giant is doing just that, piloting a program in […]

  • 5 Ways to Keep Your Personal Health Information SafeData Security, Privacy, Identity Theft

    Share

    Did members of the royal family go under the knife at an upscale London plastic surgery clinic? A recent hack at London Bridge Plastic Surgery may reveal the answer to that—and many other questions you never thought to ask. Setting aside the obvious follow-up questions (Do you care? Is it any of your business?) and regardless of your curiosity about seeing the picture proof of royal rearrangements, you should be paying attention. The hack speaks to our […]

  • phone - privacy killer

    Apple’s iPhone X could be the ultimate privacy killerPrivacy

    Share

    The odds you don’t know already know about Apple’s latest attempt at market domination — the iPhone X — are about even with the possibility that President Trump will stop using hand gestures when explaining something. That said, it is quite possible that you have not yet heard why the iPhone X should worry you. “In its continuing war on inconvenience,” Andy Greenberg of Wired wrote, Apple is poised to “give an unproven biometric security technology its […]

  • Spam

    Why Spam Is More Dangerous Than EverData Security, Technology

    Share

    Spam is supposed to be a thing of the past, but it’s not—and today it comes weaponized with manifold data-grabbing threats—from ransomware to keystroke recorders and beyond. Your email has never been more dangerous. There was a time in the early 2000s when email spam and malicious botnets were viewed as mere nuisances. A confident Bill Gates waved it away at the 2004 World Economic Forum in Davos, Switzerland: “Two years from now, spam will […]

  • Markets, GPS could be first to go in the event of global cyber conflictData Security, Technology

    Share

    The announcement of a sixth subterranean nuclear test has the world talking about how to contain the threat of a nuke-ready North Korea, but there is another concern getting insufficient attention: the potential for full spectrum cyber war. Just what that might look like is known, but seldom discussed. Remember the NASDAQ flash crash? It happened on May 6, 2010, at 2:32 pm and lasted for more than 30 minutes. Still not ringing any bells? […]

  • Are Your Connected Devices Safe?Data Security

    Share

    The number of Internet of Things (IoT) devices in use is forecasted to hit 8.4 billion this year. That’s more than the human population on planet Earth. And with successful attacks like Mirai (which was the malware used in the 2016 Dyn cyberattack) already a part of the IoT story, there’s plenty to worry about. It’s crucial we give this latest market exuberance a brief time-out. Unfortunately, the chances of that happening are fairly unlikely. So, what to do […]

  • What Equifax Teaches Us About the Dangers of ‘Breach Fatigue.’Data Security, Identity Theft

    Share

    From mid-May to July, 143 million U.S. consumers were more vulnerable to hackers than usual. Or rather, they were actively vulnerable. Equifax, one of the three major consumer credit reporting agencies, reported that the company had suffered a massive data compromise that exposed their customers’ Social Security numbers, drivers license numbers and other sensitive personally identifiable information. In a statement, they noted that the compromise was not limited to U.S. consumers. There were some customers […]

  • How Social Media Could Kill Your CompanyCybersecurity, Identity Theft

    Share

    Who are you? These days it depends on a number of factors, all of which a criminal can easily spoof. Where you are matters, both in terms of your geographic location and the kinds of personal information you place online. Ten years ago, many consumers would have shuddered at the idea of putting personal and career information where anyone could see it, much less preferences and opinions. Now it’s commonplace. The Internet being what it is – a decentralized network […]

  • Credit lockdown

    Post Equifax: Will Free Credit Freezes Help?Data Security, credit, Identity Theft

    Share

    When Equifax announced the historic data compromise that exposed the sensitive personal information of up to 143 million consumers, the company said victims would have access to credit freezes for a month free of charge. This was not exactly a solution to the fresh hell it had just announced. Frankly, it seemed like a relatively cheeky move considering the staggering number of people who had just learned that they will be looking over their shoulders for a […]

  • The Equifax Breach and the Cybersecurity Silver BulletData Security, Cybersecurity, Technology

    Share

    Some time ago, the popular show Mythbusters wanted to find out if the Lone Ranger was right about silver bullets being better than lead ones. Turns out silver bullets are actually slower and less accurate. When it comes to cybersecurity, quick-fix silver bullets are also less effective than tried-and-true approaches. The most effective cybersecurity strategies begin with two certainties: mistakes will be made, and breaches like the one that hit Equifax will keep happening. The 143 million consumers exposed […]

LOAD MORE ARTICLES