About Adam K Levin | Contact | Videos

Author Archives: Adam Levin


  • superhero

    How the Superhero Approach Can Help You Avoid Identity TheftIdentity Theft

    Share

    A recent Experian study found that most people still have a lot to learn about the risk of identity theft. The majority of those surveyed felt like they were safe from identity theft, but not for the right reasons. The most popular misconception was that scammers, phishers and identity thieves only target the rich and possibly famous. In reality, identity thieves target low-hanging fruit. To an identity thief, we’re all Kim Kardashian. More than half […]

  • Summertime Scams

    6 Summer Scams & How to Avoid ThemData Security, Consumer Protection

    Share

    As the weather gets warmer, mosquitos and ticks re-enter our lives, and along with them comes their larger cousin, the scam artist. There are ways to prepare for those seasonal meal stealers. The same goes for scams, as foreknowledge is the best repellent. Ticks and mosquitos aren’t harmless — they are well-known vectors for serious illnesses. Scam artists are also vectors for a plague that affects millions of people each year: identity theft. But sometimes […]

  • Privacy and surveillance

    The Bulls-eye in Your Pocket: Geo-FencingPrivacy, Technology

    Share

    First Amendment concerns and consumer privacy law has people talking about a case recently settled in Massachusetts. It revolved around the practice of serving advertisements with geo-fencing technology. At issue: was it legal for anti-abortion groups to use this new marketing technique to directly communicate with young women on their way to get abortions? According to the settlement in Massachusetts, the answer, at least for the time being, is no. The ads in question used […]

  • Cyber defense

    Are You Hack-Proof? Here’s How to Make SureSwiped, Cybersecurity, Technology

    Share

    While the writing has been on the wall for a long time, last Friday it was in the news wires when a new strain of ransomware called WannaCrypt raged like an out-of-control wildfire across Europe and Asia, ultimately impacting computers in 150 countries. For many affected by this hack, a few hundred dollars in ransom money is a pittance when compared to the cost of hiring someone to attempt the recovery of your files after […]

  • Mother's Day

    4 Mother’s Day Scams You Want to AvoidConsumer Protection, Catphishing

    Share

    Did you know that with the exception of Christmas, people spend more money on Mother’s Day than any other holiday? The forecast for 2017 is $23.6 billion, and if you think scammers aren’t on the job, there’s a new marshmallow bridge spanning Loon Lake I’d to sell you a piece of. In order, the most-gifted recipients of Mother’s Day sentimental swag are mothers and stepmothers, then wives, daughters, sisters or stepsisters, grandmothers, godmothers, and, for […]

  • bank vault

    Why a Hacker May Be Lurking Near Your Bank AccountCybersecurity

    Share

    Don’t expect the financial services industry to ever willingly disclose how much it loses to cyber thieves on an annual basis. But make no mistake determined, well-funded hacking rings continue to breach banking systems on a regular basis. And they continue to inflict material losses–likely at a scale the general public would find shocking. Breach attempts against financial services firms occurs 24/7/365, says Brian Soldato, senior product management director at NSS Labs, an Austin, Tex.-based […]

  • Identity portfolio

    5 Tricks to Make Your Identity Portfolio More SecureData Security, Identity Theft

    Share

    I’ve written extensively about the importance of building a credit portfolio. Credit equals buying power, which, when used wisely, can lead to increased net worth. Put simply, bad credit means fewer consumer choices and a staggering number of lost opportunities in the way of deals, car-factory incentives and other credit-based transactions. No matter the purchase type, the lowest interest rates and the biggest loans go to those with the strongest credit portfolios. You can read […]

  • bad employee

    How Your Worst Employee Could Literally Put You Out of BusinessData Security, Technology

    Share

    Doubtless, you are aware that phishing (an email that looks like a company communication or something work-related containing malware) and spear phishing (the same thing from the spoofed account of a company executive) have become facts of life. Or maybe not. There are a host of reasons to be concerned. Phishing attacks are literally out of control. According to one survey published earlier this year, 85 percent of companies in the United States reported being […]

  • biometric scanner

    Is It Time to Buy a Biometric Scanner?Data Security, Identity Theft

    Share

    Identity theft is still out there, keeping pace with the latest innovations and security measures, and snaring new victims every day. With the advent of cheaper, standalone, easy-to-integrate biometric technology for authentication, is it time to buy a fingerprint scanner? What’s a Biometric Scanner? Biometric technology uses physical or biological information, like a fingerprint, retinal scan or heartbeat, to authenticate a person’s identity. You can currently purchase the most commonplace biometric scanner — that is, […]

  • nigerian scam

    Why You Need to Know About This Nigerian Hacker Ring Targeting Small BusinessesData Security, Technology

    Share

    Nigerian 419 con artists have been around seemingly forever, relentlessly sucking funds out of the bank accounts of one duped individual victim at a time. You’ve probably heard of them. These gambits revolve around tricking the victim into thinking he or she can help transfer a large sum into a U.S. bank, and make a tidy profit on the side. But now some veteran Nigerian criminals have evolved–ripping off small- and medium-sized businesses on a […]

LOAD MORE ARTICLES