About Adam K Levin | Contact | Videos

Author Archives: Guest Blogger


Recent HBO hack could spur better cybersecurity practices

Share

Add HBO to the growing list of companies victimized by a serious cybersecurity incident. According to The Associated Press, cyber criminals stole 1.5 terabytes of corporate data, including some HBO shows and sent a ransom video to CEO Richard Plepler in which the hackers demanded a ransom worth millions in bitcoin. As of this writing, there is still a lot of mystery surrounding the HBO attack. “Beyond the already released programming and ‘Game of Thrones’ episode outline, it’s unclear exactly what else the hackers might have,” Grant Rindner […]

  • Identity theft

    How Tragedy & Identity Thieves Kept One Woman From a Near-Perfect Credit ScoreIdentity Theft

    Share

    Identity theft can deal serious damage to your finances. And repairing its effects can be stressful and time-consuming, especially when it comes to repairing the damage to your credit. Just ask New Jersey resident, Erin (who asked us not to use her last name, as she was a victim of identity theft). This, plus credit problems arising from her recently deceased parents’ financially accounts, dragged her score down by nearly 50 points, keeping her from the […]

  • Machine learning

    As Data Multiplies, Technology Helps Tackle More Challenging Security IssuesData Security, Cybersecurity

    Share

    IT systems have never been more powerful or accessible to businesses. However, the scope and scale of cyber crimes continues to outpace tech innovation. For years, the challenge for internal IT and security teams has been to use existing company data to construct an integrated picture of oddities and unexpected actions on their network. Recent advancements in machine learning and behavior or anomaly-based analytics that leverage existing enterprise logs have provided security teams with much more accurate intelligence […]

  • Medical device

    Security of Medical Devices Needs Intensive CareTechnology

    Share

    Medical devices, such as such as pacemakers, insulin pumps and defibrillators, could become lethal in the hands of a hacker tampering with them remotely.  A new study that shows medical devices—and patients—are vulnerable to cyber attacks is a wake-up call for manufacturers, according to a Silicon Valley software company that sponsored the study. “Device manufacturers must change their culture and look at security as an equal to patient safety,” says Chris Clark, principal security engineer of strategic initiatives for Mountain […]

  • VPN

    Want to protect your small or midsize business from a breach? Set up a VPNData Security, Technology

    Share

    As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small-l and medium-size business owners. The growing popularity is a reflection of the chaotic times in enterprise computing, marked by malware and ransomware targeting vulnerable systems and a decentralized work force of globetrotting employees juggling several gadgets at once. More SMB data is now stored in the cloud, too, often leaving company executives at the mercy of the servers they […]

  • IoT

    As use of IoT devices explodes, detecting vulnerabilities becomes nascent industryCybersecurity

    Share

    The number of machine-to-machine connected devices—the Internet of Things—is growing faster than the world population. Cisco estimates that M2M connections will grow from 4.9 billion in 2015 to 12.8 billion by 2020 (estimated world population in 2020: 7.7 billion). Growth in IoT security expenditures is as robust. Gartner puts endpoint IoT security spending at $1,183 billion in 2015, and estimates $3,010 billion in 2020. “Everybody’s realizing that IoT security is a serious problem,” says Xu Zou, CEO […]

  • Shield your data

    Keep it safe: How to shield your sensitive data and control accessData Security

    Share

    Recent high-profile photo hacks have made headlines. In March, internet hackers targeted celebrities including Miley Cyrus, Emma Watson and Amanda Seyfried, among others, resulting in the leak of intimate photos that were posted on sites such as 4chan and Reddit. Similarly, back in 2014 hacker Ryan Collins exposed nude photos and videos of several celebrities after obtaining them from iCloud accounts. But celebrities aren’t the only ones vulnerable to hackers. Imagine if your organization’s C-level executives had […]

  • WannaCry

    White House, businesses hit snooze button after Petya, WannaCry wake-up callsData Security, Technology

    Share

    WannaCry was a wake-up call. Petya is a wake-up call. Last I checked, wake-up calls were meant to bring about change. After WannaCry, we saw a massive surge in patching around the globe, not to mention a 22-year-old “accidental hero” in the U.K. who helped halt the malicious software. It’s proof that beating the drum continuously to public and corporate institutions about serious cyber defense tactics doesn’t seem to do the trick, and once again […]

  • Cyberthieves

    New tools automate cyber criminals’ attempts to take over corporate accountsData Security, Cybersecurity

    Share

    Nearly all of the largest organizations throughout the world had their credentials exposed by cyber criminals last year, a new study has found. The study, done by London- and San Francisco-based Digital Shadows, which provides clients with information about their external digital risks, determined that 97 percent of the world’s largest 1,000 organizations had credentials exposed. The credentials are valuable to cyber criminals who “are increasingly turning to credential stuffing tools,” Digital Shadows officials say, […]

  • Fake News

    ‘Fake news’ economy is a gold mine for truth hackers, propagandistsTechnology

    Share

    Fake news is the new computer virus. That’s the conclusion I came to when reading a remarkable new report from computer security firm Trend Micro. If you doubt the massive efforts of underground “hackers” to influence you—and the massive cash they can make doing so—flip through the pages of this report. A few years ago, it could have been written about the spam, computer virus or click fraud economies. Today, “news” has been weaponized, both for […]

LOAD MORE ARTICLES