About Adam K Levin | Contact | Videos

Technology


  • The New Black Friday: Green Monday?Money, Technology

    Share

    Black Friday and Cyber Monday may be the best-known days to get holiday shopping deals, but one of the biggest shopping days of the season is happening right now: Green Monday. Digital research company comScore defines Green Monday as the last Monday at least 10 days before Christmas, and last year, it was the third-biggest online shopping day of the season (after Cyber Monday and the day after Cyber Monday). What Is ‘Green Monday’? Perhaps […]

  • Cyber thief

    Should You Be Worried About Identity Theft on Cyber Monday?Identity Theft, Technology

    Share

    Two years ago, hackers planted malware in Target’s point-of-sale system and stole 40 million credit card and debit card numbers, in addition to 70 million names, addresses, email addresses and phone numbers of Target shoppers. Worse data breaches have occurred since then, but because the Target breach happened during the Black Friday weekend and early December, it will long be associated with the security risks of holiday shopping. Those risks are present when you shop in […]

  • Credit Card

    Why Gift Cards Aren’t As Secure As Your Credit CardsConsumer Protection, credit, Technology

    Share

    It’s holiday season, which means you are almost certainly going to receive (and give) a plastic gift card during the next few weeks. When you (or they) try to spend it, a familiar process will occur: You will swipe the card’s magnetic stripe, even if you are shopping at a major retailer like Target or Walmart. This action might give you pause to ask a question: “Where’s the chip?” The past several months have been dominated by talk […]

  • 6 Cybersecurity Best Practices for Companies Looking to Protect Their DataData Security, Blog, Technology

    Share

    In my forthcoming book, Swiped, partially excerpted below, I examine some of the enterprise level, cybersecurity best practices. These are the questions organizations need to ask themselves if they want to protect the data they are sitting on. Some of the considerations: Does the organization use a standards-based security architecture that is integrated into all technology processes? In plain language, sending personal information via attachment on an email is a “technology process.” This would include […]

  • Lipstick on collar

    Life After Ashley Madison: How to Operate in a World Without SecretsData Security, Technology

    Share

    The other cufflink fell on the Ashley Madison hack Tuesday. According to Wired, 9.7 gigabytes of Ashley Madison data were dumped on the dark web, and the collection appears to “include account details and log-ins for some 32 million users.” Where we go from here is anyone’s guess. According to the Wired article, the hackers left a note with the quarry of ill-gotten files of marital listlessness: “Avid Life Media has failed to take down […]

  • Are We One Step Closer to Your Facebook Friends Impacting Your Credit?credit, Technology

    Share

    The U.S. patent office granted Facebook an updated patent on technology that would allow lenders to evaluate loan applicants based on their social network connections, reports VentureBeat. The technology tracks how closely (or not) people are connected. The technology is employed to minimize spam (people sending messages to those with whom they have no relationship) or prevent people from showing up in strangers’ search results, according to the “summary of invention” section of the patent. […]

  • 10 Industries That Could Profit From the Ashley Madison HackHumor, Technology

    Share

    The hackers who broke into AshleyMadison.com, a meeting place for people seeking extra-marital affairs, recently made good on their threat, exposing their first hostage-victim, a Massachusetts man. There are 37 million more quivering masses of flesh where he came from, and the people behind the compromise have vowed to release all of their customer information — including sexual fantasies — unless Avid Life Entertainment kills Ashley Madison and Established Men (a site where women can […]

  • Cyber thief

    The Three Laws of Cyber Fraud in Today’s Online WorldData Security, Technology

    Share

    One of the most popular sessions at the RSA Conference was the Cryptographers’ Panel, during which some of the founding fathers of modern cryptography discussed trends in research and cybersecurity in general. This year the panel consisted of Ron Rivest, Adi Shamir, Whit Diffie and Ed Georgio (former chief codemaker and chief codebreaker at NSA). During the session Shamir referred to his three laws of computer security, which he formulated many years ago: Absolutely secure systems do not exist. To halve your […]

  • A year later, Heartbleed bug still hasn’t been squashedData Security, Technology

    Share

    A recent report by cybersecurity management firm Venafi showing that a vast majority of the world’s largest companies remain vulnerable to attacks stemming from the Heartbleed flaw suggests that many have not grasped the full nature of the threat nor do they think the risk justifies the cost of remediating it. It’s been exactly one year since details of the OpenSSL flaw were first publicly disclosed. In the 12 months since then, numerous security researchers, […]

  • Personal Loan

    BSA Offers Up to $1 Million to Bust Software PiratesTechnology

    Share

    When you were a kid, you may have heard that nobody likes a tattletale. That isn’t true. BSA The Software Alliance loves tattletales. If you report software piracy to BSA and your information directly results in a legal settlement between the alliance and the offending party, you can get a significant cut of that settlement. BSA advocates for the software industry, and some of its members include tech giants like Adobe, Apple and Microsoft. It […]

LOAD MORE ARTICLES