About Adam K Levin | Contact | Videos

Blog

Blogs and article by Adam K Levin about credit, identity theft, data security, and consumer protection.


  • Power grid hacking

    Hackers reportedly infiltrate deep into U.S. power gridsTechnology

    Share

    It started off as a fake invitation to a New Year’s Eve party, emailed to energy section employees. It ended with hackers taking screen shots of power grid control computer screens. Well, we can only hope it ended there. “The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations,” Symantec wrote in its report. Symantec Corp. released an alarming report last week claiming […]

  • Equifax Data Breach

    Consumers must demand answers on Equifax data breachData Security, Consumer Protection

    Share

    Until murky details are cleared up, follow best practices for protecting personal information Equifax needs to start answering questions, fast. And this better be a turning point in consumer rights around use and storage of their personal information. It’s not even clear from the PR-worded statement that 143 million Social Security numbers were stolen, though that’s the clear implication. All we know is most Americans are “potentially” impacted. A bunch of driver’s license numbers were stolen, too. Really, all we […]

  • venmo

    How to Protect Yourself on Venmo in 5 MinutesData Security, Banking

    Share

    With Venmo being one of the most popular ways to send money, it makes sense to wonder what’s keeping your personal data and digital wallet safe. Venmo has made strides to improve its security in the past two years, but here’s the short answer to how safe Venmo is—protecting yourself comes almost entirely down to you. How to Keep Your Personal Info Safe on Venmo It takes only five minutes to make your Venmo account […]

  • Is GPS hacking causing U.S. Navy ships to crash?Data Security, Technology

    Share

    For years, security researchers and consumers have been fixated on concerns around hacking cars. Maybe they should worry about ship hacking instead. Several recent collisions involving U.S. naval vessels have sparked speculation that someone or something is interfering with the ships’ ability to steer clear of other vessels in busy waters. The striking similarities between Monday’s incident involving the Navy destroyer USS John S. McCain, and June’s incident involving another destroyer, the Fitzgerald, suggest to observers some kind […]

  • dark web

    6 Things About the ‘Darknet’ All Businesses Should KnowData Security, Technology

    Share

    Preparation, execution and monetization of any high-profile data breach that comes to mind requires multiple transactions between several tiers of co-conspirators. That collaboration takes place on the Darknet. Yet despite its ominous handle, the Darknet isn’t as mysterious as you might think. In fact, some security experts say it can be an effective form of defense for a corporation to assign an IT staffer to maintain a presence there. I will come back to that in moment. First, here’s what […]

  • Medical device

    Security of Medical Devices Needs Intensive CareTechnology

    Share

    Medical devices, such as such as pacemakers, insulin pumps and defibrillators, could become lethal in the hands of a hacker tampering with them remotely.  A new study that shows medical devices—and patients—are vulnerable to cyber attacks is a wake-up call for manufacturers, according to a Silicon Valley software company that sponsored the study. “Device manufacturers must change their culture and look at security as an equal to patient safety,” says Chris Clark, principal security engineer of strategic initiatives for Mountain […]

  • VPN

    Want to protect your small or midsize business from a breach? Set up a VPNData Security, Technology

    Share

    As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small-l and medium-size business owners. The growing popularity is a reflection of the chaotic times in enterprise computing, marked by malware and ransomware targeting vulnerable systems and a decentralized work force of globetrotting employees juggling several gadgets at once. More SMB data is now stored in the cloud, too, often leaving company executives at the mercy of the servers they […]

  • biometric scan

    Why Scanning Your Fingerprint Could Cost You Your PrivacyData Security, Privacy, Technology

    Share

    You can’t change your physical traits very easily, so if a hacker steals your biometric data–look out. Scanning a fingerprint or even an eyeball to authenticate your identity is no longer the stuff of science fiction. Biometric identification has been in practical use for a while now, and the technology gets more sophisticated every day. It should come as no surprise that security and privacy concerns have arisen along the way. And now the legal ramifications are rapidly getting more complicated. […]

  • Grandparent scam

    The Common Scams People Still Fall for All the TimeConsumer Protection

    Share

    The top site for classified ads in the U.K. conducted a study recently that should send a wave or two to this side of the Atlantic. When it comes to scams, it’s all about the bait. Gumtree found that even with the forethought that a listing was a scam, more than a third of their users would still go ahead with a transaction. As my mother would say … Actually, she’d probably just shake her […]

  • WannaCry

    White House, businesses hit snooze button after Petya, WannaCry wake-up callsData Security, Technology

    Share

    WannaCry was a wake-up call. Petya is a wake-up call. Last I checked, wake-up calls were meant to bring about change. After WannaCry, we saw a massive surge in patching around the globe, not to mention a 22-year-old “accidental hero” in the U.K. who helped halt the malicious software. It’s proof that beating the drum continuously to public and corporate institutions about serious cyber defense tactics doesn’t seem to do the trick, and once again […]

LOAD MORE ARTICLES