About Adam K Levin | Contact | Videos

Technology


  • (Video) Clinton: There was no classified info in my e-mailsData Security, Government, Video, Technology

    Share

    Adam Levin spoke with Liz Claman on Countdown to the Closing Bell on Fox Business about the security issues surrounding Former Secretary of State Hillary Clinton’s ‘homebrew’ e-mail server. Levin voiced his concerns: “Was it privacy? Was it security?… I always get scared when convenience trumps security.” Click the video above to see the full interview.

  • Privacy and security

    Cloud apps routinely expose sensitive dataData Security, Technology

    Share

    An alarming number of cloud-based apps used by enterprise employees don’t encrypt data at rest or require two-factor authentication. And an astounding number of employees are still uploading highly sensitive data to the cloud and sharing files on unsecured platforms, according to the Cloud Adoption Risk Report Q4 2014 from cloud security vendor Skyhigh Networks. The recent breach of 80 million records at health insurer Anthem was an example of how cloud services that don’t […]

  • Cyber thief

    Viral Gmail, YouTube alerts spreading via emailTechnology

    Share

    I’ve received a couple of troubling emails recently that made their way into my inbox. They were well-drafted attacks designed to convince me that my Gmail or YouTube account were about to be deleted unless I clicked a link right away. Of course, words like “warning” or “instant” should always give you pause — criminals try to get you off your game by creating a false sense of urgency. I could see someone falling for […]

  • Anthem breach shows need for wider encryption of sensitive dataData Security, Technology

    Share

    Media reports concerning the Anthem breach have indicated that the compromised personal information wasn’t encrypted. Encryption – strong, modern algorithms properly implemented with tight key management – is the most effective way to protect data in 2015. How do we know this? Edward Snowden, of course. He made it clear that the NSA is unable to break strong encryption. It’s likely no one else can, either. Many have expressed surprise that the Anthem data, clearly […]

  • Faked PayPal sites hard to distinguish from the real thingData Security, Technology

    Share

    Faked PayPal email notifications directing recipients to malicious websites aren’t new. But cybercriminals are getting a lot better at executing them. That’s what the discovery of a current phishing campaign designed to lure victims to click to a pair of very well-designed faked PayPal websites shows. The finding comes from researchers at OpenDNS, a free, advertising-sponsored service for making faster, more secure website connections. The fraudulent PayPal websites are virtually indistinguishable from the real PayPal.com, […]

  • Skin implants arrive as replacement for passwordsData Security, Technology

    Share

    CANCUN — It was a moment out of science fiction. All eyes were on Kaspersky Lab researcher Povel Torudd as he sat center stage here at the Kaspersky Security Analyst Summit late Monday, waiting to become a cyborg. Torudd volunteered to have a Near Field Communications (NFC) chip implanted in his hand by a professional body piercer using sterilized tools, a marker to show where the chip would be inserted, a scalpel and an imposing-looking […]

  • Are Smart Homes a Privacy Risk?Lifehacking, Technology

    Share

    Imagine the home of the future. While these smart homes may not be connected to transportation pods like in “The Jetsons” or have pizza hydrators like in “Back to the Future Part II,” one thing’s for sure: Abodes will be increasingly high-tech, relying on the Internet to function. The enhanced connectivity in smart homes could result in a rise in hacking risks. In 2015, things that were not Internet-enabled in the past — like thermometers and […]

  • Children and data

    Is Big Data Already Tracking Your Kindergartner?Privacy, Technology

    Share

    You’d be hard-pressed to find someone who disagrees that America’s schools are in need of serious reform. And it’s an obvious leap to think technology is the fast lane to improvement. “Ed-tech” is where some of America’s thorniest issues collide, however. Big Brother. Marketing to kids. Privacy. Boondoggles. Attention deficit disorder. Teacher accountability. As a result, ed-tech is where a lot of early tech ideas go to die. The Los Angeles Unified School District has […]

  • How Serious is the US CentCom Twitter Hack?Press, Government, Politics, Blog, Technology

    Share

    While President Obama was announcing his initiative to boost cyber security, the U.S. Central Command’s Twitter and Youtube accounts were hacked by a pro-ISIS group. How concerned should we be? Has Cyber War replaced the Cold War? Adam Levin discussed this on the Willis Report this week – see the interview below:

  • How the Sony Hack Is Changing the Way I WorkTechnology

    Share

      If the past two years have revealed anything, it’s that every conceivable mode of communication comes with its share of serious privacy and security issues. Email can be hijacked, mail servers can be breached and malware can turn your smartphone into a peepshow. Wikileaks revealed that even our phone conversations are at risk. That said, don’t panic! It’s highly unlikely anyone is listening to your phone calls. (OK, it’s possible, but you’d have to […]

LOAD MORE ARTICLES