About Adam K Levin | Contact | Videos

Author Archives: Guest Blogger


  • Computer scan

    Give your computer network a health checkupData Security, Technology

    Share

    Health awareness was celebrated across the globe last Friday on World Health Day, an event sponsored by the World Health Organization. But humans aren’t the only ones who suffer from health issues—so do computers. Here is a look at some comparable characteristics of the two species. Health Checks. Humans require assurance from their doctors from time to time that they are fit and healthy. So we schedule regular health checks to ensure we’re on the […]

  • Get Ready For the Medical ID Fraud Crisishealth care, Identity Theft

    Share

    It is a documented fact that unscrupulous healthcare professionals – and dishonest patients – file more than $77 billion worth of fraudulent Medicare and Medicaid claims on an annual basis. Meanwhile, cyber criminals have been busy the past two years pilfering medical ID data for tens of millions of citizens, as well as business records from hundreds, if not thousands, of healthcare service providers and insurers. These two malevolent forces are on a collision course. […]

  • Saks Fifth Avenue confirms data of high-net-worth individuals was exposed onlineData Security, Identity Theft

    Share

    Here’s yet another reminder that you should always have some “burner” email address accounts handy for interactions with e-commerce websites. I’ve confirmed that shoppers at Saks Fifth Avenue who had asked the firm for notifications when sold-out items were available had their personal information exposed by the firm. Some 80,000 email addresses and/or phone numbers were exposed, along with other personal nuggets—hints at where the victims worked, and what items they ordered, for example. The […]

  • Cyber attack

    Silence isn’t golden: Information sharing is key to combating cyber attacksData Security, Cybersecurity

    Share

    Cybersecurity continues to bolster the focus of national—and global—attention, with cybersecurity professionals gaining significant strides against international cyber crime. Most recently, two Russian intelligence officers and two criminal hackers were charged in a Yahoo data breach incident, which started in January 2014 and involved 500 million compromised Yahoo accounts. The U.S. Department of Justice and FBI are calling the indictments a victory for information sharing and encourage other companies to report breaches to the federal […]

  • pacemaker

    Will hackers turn your lifesaving device into a life-threatening one?health care, Technology

    Share

    What seemed like a farfetched scenario out of Hollywood four years ago is now yet another reality that security experts have been warning about. In the screen version, the U.S. vice president is assassinated on the TV show “Homeland” after a hacker takes control of his pacemaker and stops his heart—making it look like a heart attack. In real life, the U.S. Food and Drug Administration recently released a safety warning that St. Jude Medical […]

  • healthcare

    What GOP Health Care Means for Your WalletGovernment, Personal Finance

    Share

    Will you be better or worse off if Republicans pass their version of health care reform? That’s the burning question for most Americans as they watch the arm wrestling going on in Washington, D.C. As with the health care debate itself, there are no easy answers. The bill being debated right now, the American Health Care Act working its way through the House of Representatives, offers strong hints about what health insurance will look like when […]

  • CIA

    How bad is recent WikiLeaks document spill about CIA? Look beyond headlinesData Security, Government

    Share

    WikiLeaks got everyone’s attention again last week, with dire headlines proclaiming the entire American government spook infrastructure had just been decimated by the secret-smashing site. Julian Assange, true to form, has shared a little leaked data and promised a whole lot more. (“Less than 1%” has been shared, the site said in a tweet). The cache of stolen documents it published does have a media-friendly name, however: Vault7.Hold on to your hyperbole: There’s a lot […]

  • data breach

    Cyber attacks becoming big threat for small businessesCybersecurity

    Share

    Small and midsize businesses are increasingly at risk for data breach class-action lawsuits that typically have targeted large corporations. Large companies are learning to address cyber threats. Hackers are responding by setting their sights on SMBs. It’s simply more productive and efficient to attack poorly protected companies that could take weeks or even months to notice they’ve been breached. As the risk of exposure moves downstream, the associated class-action lawsuits surely will follow. Statistics from […]

  • My Friend Cayla, similar toys may not be your child’s best friendIdentity Theft, Technology

    Share

    Germany has taken steps to allay concerns about how the “Internet of Toys” could put children in harm’s way. This past December, consumer groups concerned with child safety petitioned the Federal Trade Commission to look into a hot new doll, named My Friend Cayla, and its counterpart marketed to boys, i-Que Intelligent Robot. Privacy advocates expressed concern about the dolls’ capacity to spy on children. And now German authorities have banned these two internet-connected toys […]

  • Tax fraud

    How to Make Sure Someone Doesn’t Steal Your Tax RefundPersonal Finance, Identity Theft

    Share

    Americans taxpayers are too lax about identity theft, according to CyberScout. A survey conducted by the data security and identity protection firm found more than half of Americans aren’t worried about tax fraud, despite federal reports showing identity thieves filed 787,000 fraudulent returns in 2016, which adds up to more than $4 billion in fraud. The survey also found that only 35% of taxpayers ask their preparers to use two-factor authentication (which is stronger than […]

LOAD MORE ARTICLES