About Adam K Levin | Contact | Videos

Author Archives: Adam Levin


  • bank vault

    Why a Hacker May Be Lurking Near Your Bank AccountCybersecurity

    Share

    Don’t expect the financial services industry to ever willingly disclose how much it loses to cyber thieves on an annual basis. But make no mistake determined, well-funded hacking rings continue to breach banking systems on a regular basis. And they continue to inflict material losses–likely at a scale the general public would find shocking. Breach attempts against financial services firms occurs 24/7/365, says Brian Soldato, senior product management director at NSS Labs, an Austin, Tex.-based […]

  • Identity portfolio

    5 Tricks to Make Your Identity Portfolio More SecureData Security, Identity Theft

    Share

    I’ve written extensively about the importance of building a credit portfolio. Credit equals buying power, which, when used wisely, can lead to increased net worth. Put simply, bad credit means fewer consumer choices and a staggering number of lost opportunities in the way of deals, car-factory incentives and other credit-based transactions. No matter the purchase type, the lowest interest rates and the biggest loans go to those with the strongest credit portfolios. You can read […]

  • bad employee

    How Your Worst Employee Could Literally Put You Out of BusinessData Security, Technology

    Share

    Doubtless, you are aware that phishing (an email that looks like a company communication or something work-related containing malware) and spear phishing (the same thing from the spoofed account of a company executive) have become facts of life. Or maybe not. There are a host of reasons to be concerned. Phishing attacks are literally out of control. According to one survey published earlier this year, 85 percent of companies in the United States reported being […]

  • biometric scanner

    Is It Time to Buy a Biometric Scanner?Data Security, Identity Theft

    Share

    Identity theft is still out there, keeping pace with the latest innovations and security measures, and snaring new victims every day. With the advent of cheaper, standalone, easy-to-integrate biometric technology for authentication, is it time to buy a fingerprint scanner? What’s a Biometric Scanner? Biometric technology uses physical or biological information, like a fingerprint, retinal scan or heartbeat, to authenticate a person’s identity. You can currently purchase the most commonplace biometric scanner — that is, […]

  • nigerian scam

    Why You Need to Know About This Nigerian Hacker Ring Targeting Small BusinessesData Security, Technology

    Share

    Nigerian 419 con artists have been around seemingly forever, relentlessly sucking funds out of the bank accounts of one duped individual victim at a time. You’ve probably heard of them. These gambits revolve around tricking the victim into thinking he or she can help transfer a large sum into a U.S. bank, and make a tidy profit on the side. But now some veteran Nigerian criminals have evolved–ripping off small- and medium-sized businesses on a […]

  • Why Tax Collection Scams Are Getting Harder to StopCybersecurity, Personal Finance

    Share

    I’ve written about tax-related crime for years, and have always offered this fail-safe rule to avoid tax scams: If you ever receive a call from the IRS about back taxes or any other money you supposedly owe the government, hang up because it’s a scam. There was something comforting about that advice — maybe even a little satisfying. I mean, who secretly doesn’t want to hang up on the taxman? But it seemed no amount […]

  • How Criminals Are Probing the Internet to Illicitly Control CompaniesData Security, Technology

    Share

    When a young Finnish programmer named Tatu Ylönen conjured up the Secure Shell (SSH) coding protocol in 1995, he had no inkling of the pivotal role his creation would play in the rapid evolution of network-centric commerce. And Ylönen certainly never imagined that one day he would be consumed with spreading awareness about a darker aspect of SSH: his protocol – or, more precisely, how SSH has come to be used as part of the […]

  • Easter scam

    6 Easter Scams You Want to AvoidConsumer Protection, Swiped

    Share

    Easter is a time for family, colorful parties and egg hunts, but sadly it also attracts scam artists looking to make a quick buck during the high-fructose corn syrup free-for-all. There are all stripes of Eastertime cons and scams waiting for you if you’re not paying attention — or even if you are. Some don’t really qualify as scams, whether we’re talking about those colorful plastic eggs for storing treats, sometimes loaded with lead paint, […]

  • Privacy

    Will We Ever Stop Bugging Ourselves?Privacy, Technology

    Share

    We live in an age of hackers. They are employed by our government and deployed by foreign powers. They are freelancers with goals ranging from netting big consulting fees in exchange for the discovery of potentially damaging vulnerabilities before they make the evening news, to sending a message, to righting a perceived wrong, to outright criminal activity. While the various hacker camps are different, they present the same conundrum to all of us: Is anything […]

  • vacation scam

    How to Enjoy Your Vacation Without Getting ScammedConsumer Protection, Identity Theft

    Share

    Spring has begun, which means open season on travelers who aren’t well-versed in the various scams waiting for them on the seamier side of paradise. While the scams abound, being forewarned is forearmed. Here are some typical scams that can ruin your vacation, drawn from my book Swiped: How to Protect Yourself in a World Filled with Scammers, Phishers, and Identity Thieves. 1. Asocial Media? One seldom publicized use of social media (at least in […]

LOAD MORE ARTICLES