About Adam K Levin | Contact | Videos

Author Archives: Guest Blogger


  • Do Genetics Influence Your Credit Score?Financial Literacy, credit

    Share

    There is the standard list of factors that influence your credit score: payment history, outstanding balances, the types of credit that you use and so on. But what you probably don’t realize is that your genes may also play an important role. Yes, your biological wiring might make you more likely to be more risk-seeking and take on more debt, which could lead to a lower FICO score. I came across this intriguing discovery while […]

  • Credit Card Interest Rate

    UAE Bank Issues Scented Credit CardPersonal Finance, Humor

    Share

    A bank in the Middle East released a scented credit card in January, targeting women with this financial product that doubles as a medium for self-expression. Al Hilal, the bank, says it’s the first scented credit card in the United Arab Emirates. It may be new to the UAE, but scented credit cards were introduced a while ago. Japan Credit Bureau introduced a scented credit card (also aimed at women) in 2005, though it’s unclear […]

  • Privacy and security

    Cloud apps routinely expose sensitive dataData Security, Technology

    Share

    An alarming number of cloud-based apps used by enterprise employees don’t encrypt data at rest or require two-factor authentication. And an astounding number of employees are still uploading highly sensitive data to the cloud and sharing files on unsecured platforms, according to the Cloud Adoption Risk Report Q4 2014 from cloud security vendor Skyhigh Networks. The recent breach of 80 million records at health insurer Anthem was an example of how cloud services that don’t […]

  • Cyber thief

    Viral Gmail, YouTube alerts spreading via emailTechnology

    Share

    I’ve received a couple of troubling emails recently that made their way into my inbox. They were well-drafted attacks designed to convince me that my Gmail or YouTube account were about to be deleted unless I clicked a link right away. Of course, words like “warning” or “instant” should always give you pause — criminals try to get you off your game by creating a false sense of urgency. I could see someone falling for […]

  • 3 Ways to Protect Your Kids From ID Theft After Data BreachesIdentity Theft

    Share

    When a widespread data breach happens, children are often the most at risk for identity theft. Their clean credit histories make them targets for identity thieves to steal information and open new lines of credit. After the Anthem data breach, millions of children in the U.S. had their personal information exposed, making them vulnerable to identity theft. As children are highly at risk, parents should take precautions after data breaches to prevent identity theft. Here […]

  • Anthem breach shows need for wider encryption of sensitive dataData Security, Technology

    Share

    Media reports concerning the Anthem breach have indicated that the compromised personal information wasn’t encrypted. Encryption – strong, modern algorithms properly implemented with tight key management – is the most effective way to protect data in 2015. How do we know this? Edward Snowden, of course. He made it clear that the NSA is unable to break strong encryption. It’s likely no one else can, either. Many have expressed surprise that the Anthem data, clearly […]

  • Faked PayPal sites hard to distinguish from the real thingData Security, Technology

    Share

    Faked PayPal email notifications directing recipients to malicious websites aren’t new. But cybercriminals are getting a lot better at executing them. That’s what the discovery of a current phishing campaign designed to lure victims to click to a pair of very well-designed faked PayPal websites shows. The finding comes from researchers at OpenDNS, a free, advertising-sponsored service for making faster, more secure website connections. The fraudulent PayPal websites are virtually indistinguishable from the real PayPal.com, […]

  • Skin implants arrive as replacement for passwordsData Security, Technology

    Share

    CANCUN — It was a moment out of science fiction. All eyes were on Kaspersky Lab researcher Povel Torudd as he sat center stage here at the Kaspersky Security Analyst Summit late Monday, waiting to become a cyborg. Torudd volunteered to have a Near Field Communications (NFC) chip implanted in his hand by a professional body piercer using sterilized tools, a marker to show where the chip would be inserted, a scalpel and an imposing-looking […]

  • Is Your Smart TV Listening to You?Privacy

    Share

    “Samsung may collect and your device may capture voice commands and associated texts so that we can provide you with Voice Recognition features and evaluate and improve the features. Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition. If you do not enable Voice Recognition, you will not be able […]

  • Can You Stop Medical ID Theft After the Anthem Breach?Data Security, health care

    Share

    Anthem, the second-largest health insurer in the U.S., was hit by a major data breach last week. The news broke Feb. 4, and the company posted a letter online from the president and CEO, Joseph R. Swedish. Two sentences from this letter are displayed in a large, blue box on the side of anthemfacts.com, the page created for updates on the situation: “Anthem was the target of a very sophisticated external cyber attack. Based on what […]

LOAD MORE ARTICLES