About Adam K Levin | Contact | Videos

Blog

Blogs and article by Adam K Levin about credit, identity theft, data security, and consumer protection.


  • Airbnb scam

    How to Avoid the Latest Airbnb ScamConsumer Protection, Technology

    Share

    A friend of mine showed up last night at a place we sometimes meet. He looked like Red Sox pitcher Chris Sale after lobbing a game-ending home run to Aaron Judge of the Yankees. He was supposed to have been on a plane to Italy. I asked him what happened. “We were all set to head out,” he said. “First leg: Rome. But I just canceled our tickets, like, a second ago.” I asked why. “Airbnb […]

  • Election hacking

    What We Learned Last Week about the Presidential ElectionPolitics

    Share

    The NSA leak about Russian efforts to hack the 2016 presidential election and the testimony of former FBI director James Comey last week revealed something that could become an extinction-level problem for the Trump administration. First, in his public testimony before the Senate Intelligence Committee, James Comey stated what we already knew to be true. Russia tried to influence American politics, specifically the outcome of a presidential race. That he was not forthcoming with the […]

  • Fake News

    ‘Fake news’ economy is a gold mine for truth hackers, propagandistsTechnology

    Share

    Fake news is the new computer virus. That’s the conclusion I came to when reading a remarkable new report from computer security firm Trend Micro. If you doubt the massive efforts of underground “hackers” to influence you—and the massive cash they can make doing so—flip through the pages of this report. A few years ago, it could have been written about the spam, computer virus or click fraud economies. Today, “news” has been weaponized, both for […]

  • wedding scam

    5 Scary Wedding Scams to Avoid This SeasonLifehacking, Consumer Protection

    Share

    Weddings require many important decisions and the wrong call can mean the difference between an unforgettable wonderful day and a day that makes you angry every time you think about it. The often unreasonably high expectations of families and friends and at least one spouse-to-be only makes matters more fraught. With such a high level of stress, it’s only a matter of luck that mistakes don’t get made. Scam artists are counting on that. There […]

  • Children's online safety

    Now’s the Time to Talk Online Security With Your ChildrenData Security, Technology

    Share

    The time is right for getting hacked or worse, having the contents of your computer held hostage by ransomware. For a couple of carefree and extreme data-consuming months, kids everywhere will be doing whatever they want online even if you’ve tried to control them. In other words, be very afraid. Only you know if it is time to have “the talk” with your child about online security. But before you sheepishly clear your throat in […]

  • Cybersecurity experts cringe as Trump hands out his cell phone numberData Security, Politics

    Share

    The internet stirred earlier this week about the meaning of the word “Covfefe”—generated, one could guess, when the president fell asleep mid-tweet, phone in hand. But a more important Trump cell phone issue got far less attention. The Associated Press reported that Trump is giving out his cell phone number to world leaders so they can call him directly. Not only is this highly unusual, it creates plenty of security risks—not to mention public records issues. Earlier, […]

  • Summertime Scams

    6 Summer Scams & How to Avoid ThemData Security, Consumer Protection

    Share

    As the weather gets warmer, mosquitos and ticks re-enter our lives, and along with them comes their larger cousin, the scam artist. There are ways to prepare for those seasonal meal stealers. The same goes for scams, as foreknowledge is the best repellent. Ticks and mosquitos aren’t harmless — they are well-known vectors for serious illnesses. Scam artists are also vectors for a plague that affects millions of people each year: identity theft. But sometimes […]

  • Health records

    Health care IT departments must defend against cyber attacks — and also the NSAData Security, health care

    Share

    Every successful cyber attack provides a learning opportunity for technologists. WannaCry provides two: Big organizations, particularly in health care, must learn to prioritize safety over compliance; and while doing that, they shouldn’t have to fight against American-made weaponry. For a long time, many health care providers have been worried about the wrong thing in cybersecurity—compliance rather than patient safety. With the WannaCry attack, we see the most frightening example yet of the devastating consequences. Last […]

  • Privacy and surveillance

    The Bulls-eye in Your Pocket: Geo-FencingPrivacy, Technology

    Share

    First Amendment concerns and consumer privacy law has people talking about a case recently settled in Massachusetts. It revolved around the practice of serving advertisements with geo-fencing technology. At issue: was it legal for anti-abortion groups to use this new marketing technique to directly communicate with young women on their way to get abortions? According to the settlement in Massachusetts, the answer, at least for the time being, is no. The ads in question used […]

  • Cyber defense

    Are You Hack-Proof? Here’s How to Make SureSwiped, Cybersecurity, Technology

    Share

    While the writing has been on the wall for a long time, last Friday it was in the news wires when a new strain of ransomware called WannaCrypt raged like an out-of-control wildfire across Europe and Asia, ultimately impacting computers in 150 countries. For many affected by this hack, a few hundred dollars in ransom money is a pittance when compared to the cost of hiring someone to attempt the recovery of your files after […]

LOAD MORE ARTICLES