About Adam K Levin | Contact | Videos

Blog

Blogs and article by Adam K Levin about credit, identity theft, data security, and consumer protection.


  • cyberattack

    50 Ways to Avoid (or Deal With) a CyberattackData Security, Technology

    Share

    In case you missed it, a major cyberattack swept the globe Friday. Per pretty much every major news outlet here in the U.S., hackers locked computer systems worldwide, then threatened to destroy data if the victim did not pay to be let back in. In other words, they executed a large scale ransomware attack, targeting companies, government agencies, public institutions and ordinary citizens across continents. The attack comes just one week after Google Docs users […]

  • Ransomware

    Why WannaCry portends coming surge in attacks launched via self-spreading wormsData Security, Technology

    Share

    The landmark WannaCry ransomware attack, I believe, may have been a proof of concept experiment that inadvertently spun out of control after it got released prematurely. But now that it’s out there, WannaCry signifies two developments of profound consequence to company decision-makers monitoring the cybersecurity threat landscape: • It revives the self-propagating internet worm as a preferred way to rapidly spread new exploits, machine to machine, with no user action required. • It lights up […]

  • Mother's Day

    4 Mother’s Day Scams You Want to AvoidConsumer Protection, Catphishing

    Share

    Did you know that with the exception of Christmas, people spend more money on Mother’s Day than any other holiday? The forecast for 2017 is $23.6 billion, and if you think scammers aren’t on the job, there’s a new marshmallow bridge spanning Loon Lake I’d to sell you a piece of. In order, the most-gifted recipients of Mother’s Day sentimental swag are mothers and stepmothers, then wives, daughters, sisters or stepsisters, grandmothers, godmothers, and, for […]

  • bad employee

    How Your Worst Employee Could Literally Put You Out of BusinessData Security, Technology

    Share

    Doubtless, you are aware that phishing (an email that looks like a company communication or something work-related containing malware) and spear phishing (the same thing from the spoofed account of a company executive) have become facts of life. Or maybe not. There are a host of reasons to be concerned. Phishing attacks are literally out of control. According to one survey published earlier this year, 85 percent of companies in the United States reported being […]

  • nigerian scam

    Why You Need to Know About This Nigerian Hacker Ring Targeting Small BusinessesData Security, Technology

    Share

    Nigerian 419 con artists have been around seemingly forever, relentlessly sucking funds out of the bank accounts of one duped individual victim at a time. You’ve probably heard of them. These gambits revolve around tricking the victim into thinking he or she can help transfer a large sum into a U.S. bank, and make a tidy profit on the side. But now some veteran Nigerian criminals have evolved–ripping off small- and medium-sized businesses on a […]

  • How Criminals Are Probing the Internet to Illicitly Control CompaniesData Security, Technology

    Share

    When a young Finnish programmer named Tatu Ylönen conjured up the Secure Shell (SSH) coding protocol in 1995, he had no inkling of the pivotal role his creation would play in the rapid evolution of network-centric commerce. And Ylönen certainly never imagined that one day he would be consumed with spreading awareness about a darker aspect of SSH: his protocol – or, more precisely, how SSH has come to be used as part of the […]

  • Easter scam

    6 Easter Scams You Want to AvoidConsumer Protection, Swiped

    Share

    Easter is a time for family, colorful parties and egg hunts, but sadly it also attracts scam artists looking to make a quick buck during the high-fructose corn syrup free-for-all. There are all stripes of Eastertime cons and scams waiting for you if you’re not paying attention — or even if you are. Some don’t really qualify as scams, whether we’re talking about those colorful plastic eggs for storing treats, sometimes loaded with lead paint, […]

  • Computer scan

    Give your computer network a health checkupData Security, Technology

    Share

    Health awareness was celebrated across the globe last Friday on World Health Day, an event sponsored by the World Health Organization. But humans aren’t the only ones who suffer from health issues—so do computers. Here is a look at some comparable characteristics of the two species. Health Checks. Humans require assurance from their doctors from time to time that they are fit and healthy. So we schedule regular health checks to ensure we’re on the […]

  • Privacy

    Will We Ever Stop Bugging Ourselves?Privacy, Technology

    Share

    We live in an age of hackers. They are employed by our government and deployed by foreign powers. They are freelancers with goals ranging from netting big consulting fees in exchange for the discovery of potentially damaging vulnerabilities before they make the evening news, to sending a message, to righting a perceived wrong, to outright criminal activity. While the various hacker camps are different, they present the same conundrum to all of us: Is anything […]

  • Get Ready For the Medical ID Fraud Crisishealth care, Identity Theft

    Share

    It is a documented fact that unscrupulous healthcare professionals – and dishonest patients – file more than $77 billion worth of fraudulent Medicare and Medicaid claims on an annual basis. Meanwhile, cyber criminals have been busy the past two years pilfering medical ID data for tens of millions of citizens, as well as business records from hundreds, if not thousands, of healthcare service providers and insurers. These two malevolent forces are on a collision course. […]

LOAD MORE ARTICLES