About Adam K Levin | Contact | Videos

Technology


sex toy eavesdropping

Buyer Beware: Your Smart Sex Toy Is Listening

Share

As if the recent news of every Tom, Dick and Harry out in Hollywood creeping on women in every way imaginable weren’t enough, now comes news that a smart sex toy manufacturer may have been caught creeping on consumers—specifically with a predilection to eavesdrop on lovers in mechanical delicto. The story comes via Reddit: A Lovense remote control vibrator app recorded sessions without the permission of at least one user. It was bound to happen […]

  • phishing

    Study: Phishing, Not Data Breaches Most Likely Cause of Account TakeoverData Security, Technology

    Share

    A recent Google study found that phishing exploits are far more likely to be the cause of account takeovers than the information compromised by data breaches. “Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials” was conducted in cooperation with the University of California, Berkeley and the International Computer Science Institute gathered data from March 2016 through March 2017. Sampling more than 1.9 billion stolen usernames and passwords exposed by past data breaches […]

  • selfie

    Facebook Says “Send Nudes.” Don’t.Privacy, Technology

    Share

    If a shady looking character told you to give him pictures of yourself naked, would you? How about a video? What if he told you that it was for your own good? Even if you have less sense than one of the rocks in Kim Jong-un’s head, you wouldn’t do it. Now what if Facebook asked you for nudes? According to The Verge, the social media giant is doing just that, piloting a program in […]

  • Spam

    Why Spam Is More Dangerous Than EverData Security, Technology

    Share

    Spam is supposed to be a thing of the past, but it’s not—and today it comes weaponized with manifold data-grabbing threats—from ransomware to keystroke recorders and beyond. Your email has never been more dangerous. There was a time in the early 2000s when email spam and malicious botnets were viewed as mere nuisances. A confident Bill Gates waved it away at the 2004 World Economic Forum in Davos, Switzerland: “Two years from now, spam will […]

  • Markets, GPS could be first to go in the event of global cyber conflictData Security, Technology

    Share

    The announcement of a sixth subterranean nuclear test has the world talking about how to contain the threat of a nuke-ready North Korea, but there is another concern getting insufficient attention: the potential for full spectrum cyber war. Just what that might look like is known, but seldom discussed. Remember the NASDAQ flash crash? It happened on May 6, 2010, at 2:32 pm and lasted for more than 30 minutes. Still not ringing any bells? […]

  • The Equifax Breach and the Cybersecurity Silver BulletData Security, Cybersecurity, Technology

    Share

    Some time ago, the popular show Mythbusters wanted to find out if the Lone Ranger was right about silver bullets being better than lead ones. Turns out silver bullets are actually slower and less accurate. When it comes to cybersecurity, quick-fix silver bullets are also less effective than tried-and-true approaches. The most effective cybersecurity strategies begin with two certainties: mistakes will be made, and breaches like the one that hit Equifax will keep happening. The 143 million consumers exposed […]

  • Power grid hacking

    Hackers reportedly infiltrate deep into U.S. power gridsTechnology

    Share

    It started off as a fake invitation to a New Year’s Eve party, emailed to energy section employees. It ended with hackers taking screen shots of power grid control computer screens. Well, we can only hope it ended there. “The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations,” Symantec wrote in its report. Symantec Corp. released an alarming report last week claiming […]

  • Is GPS hacking causing U.S. Navy ships to crash?Data Security, Technology

    Share

    For years, security researchers and consumers have been fixated on concerns around hacking cars. Maybe they should worry about ship hacking instead. Several recent collisions involving U.S. naval vessels have sparked speculation that someone or something is interfering with the ships’ ability to steer clear of other vessels in busy waters. The striking similarities between Monday’s incident involving the Navy destroyer USS John S. McCain, and June’s incident involving another destroyer, the Fitzgerald, suggest to observers some kind […]

  • dark web

    6 Things About the ‘Darknet’ All Businesses Should KnowData Security, Technology

    Share

    Preparation, execution and monetization of any high-profile data breach that comes to mind requires multiple transactions between several tiers of co-conspirators. That collaboration takes place on the Darknet. Yet despite its ominous handle, the Darknet isn’t as mysterious as you might think. In fact, some security experts say it can be an effective form of defense for a corporation to assign an IT staffer to maintain a presence there. I will come back to that in moment. First, here’s what […]

  • Medical device

    Security of Medical Devices Needs Intensive CareTechnology

    Share

    Medical devices, such as such as pacemakers, insulin pumps and defibrillators, could become lethal in the hands of a hacker tampering with them remotely.  A new study that shows medical devices—and patients—are vulnerable to cyber attacks is a wake-up call for manufacturers, according to a Silicon Valley software company that sponsored the study. “Device manufacturers must change their culture and look at security as an equal to patient safety,” says Chris Clark, principal security engineer of strategic initiatives for Mountain […]

LOAD MORE ARTICLES