About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


cybersecurity

Forever 21 Suffers Breach, Underscores Cybersecurity Basics

Share

Word started spreading yesterday the way it often does with cyber events, like fog. The sun burned through it quickly, in this instance, and we now know (sort of)…something happened. Forever 21 is still a little vague on specifics, but between March and October of this year, at least some of the company’s point-of-sale devices were vulnerable to attack. According to news reports, a 2015 encryption upgrade was either not installed or not delivered. The […]

  • SHIELD act

    New York AG Proposes Tougher Data Breach LawsData Security, Cybersecurity

    Share

    Even though we haven’t passed the green flags of Thanksgiving, it’s beginning to look a lot like Christmas—at least for cybersecurity advocates. In this edition of “Someone’s Actually Paying attention,” New York State Attorney General Eric Schneiderman has introduced a bill that expands the definition of a breach in his state. The bill is called the Stop Hacks and Improve Electronic Security Act, or the SHIELD Act for short, and it already has the support […]

  • Secure email

    Can You Hack-Proof Your Personal Email Address?Data Security, Swiped

    Share

    How would you feel if the digital “you” were deleted? The common wisdom in cybersecurity circles is that if you think it can’t happen to you, it probably will. Consider Mat Honan’s story. “First my Google account was taken over, then deleted,” Honan wrote. “Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages.” Honan’s AppleID was used to remotely delete all the data on his iPhone, iPad, and […]

  • phishing

    Study: Phishing, Not Data Breaches Most Likely Cause of Account TakeoverData Security, Technology

    Share

    A recent Google study found that phishing exploits are far more likely to be the cause of account takeovers than the information compromised by data breaches. “Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials” was conducted in cooperation with the University of California, Berkeley and the International Computer Science Institute gathered data from March 2016 through March 2017. Sampling more than 1.9 billion stolen usernames and passwords exposed by past data breaches […]

  • 5 Ways to Keep Your Personal Health Information SafeData Security, Privacy, Identity Theft

    Share

    Did members of the royal family go under the knife at an upscale London plastic surgery clinic? A recent hack at London Bridge Plastic Surgery may reveal the answer to that—and many other questions you never thought to ask. Setting aside the obvious follow-up questions (Do you care? Is it any of your business?) and regardless of your curiosity about seeing the picture proof of royal rearrangements, you should be paying attention. The hack speaks to our […]

  • Spam

    Why Spam Is More Dangerous Than EverData Security, Technology

    Share

    Spam is supposed to be a thing of the past, but it’s not—and today it comes weaponized with manifold data-grabbing threats—from ransomware to keystroke recorders and beyond. Your email has never been more dangerous. There was a time in the early 2000s when email spam and malicious botnets were viewed as mere nuisances. A confident Bill Gates waved it away at the 2004 World Economic Forum in Davos, Switzerland: “Two years from now, spam will […]

  • Markets, GPS could be first to go in the event of global cyber conflictData Security, Technology

    Share

    The announcement of a sixth subterranean nuclear test has the world talking about how to contain the threat of a nuke-ready North Korea, but there is another concern getting insufficient attention: the potential for full spectrum cyber war. Just what that might look like is known, but seldom discussed. Remember the NASDAQ flash crash? It happened on May 6, 2010, at 2:32 pm and lasted for more than 30 minutes. Still not ringing any bells? […]

  • Are Your Connected Devices Safe?Data Security

    Share

    The number of Internet of Things (IoT) devices in use is forecasted to hit 8.4 billion this year. That’s more than the human population on planet Earth. And with successful attacks like Mirai (which was the malware used in the 2016 Dyn cyberattack) already a part of the IoT story, there’s plenty to worry about. It’s crucial we give this latest market exuberance a brief time-out. Unfortunately, the chances of that happening are fairly unlikely. So, what to do […]

  • What Equifax Teaches Us About the Dangers of ‘Breach Fatigue.’Data Security, Identity Theft

    Share

    From mid-May to July, 143 million U.S. consumers were more vulnerable to hackers than usual. Or rather, they were actively vulnerable. Equifax, one of the three major consumer credit reporting agencies, reported that the company had suffered a massive data compromise that exposed their customers’ Social Security numbers, drivers license numbers and other sensitive personally identifiable information. In a statement, they noted that the compromise was not limited to U.S. consumers. There were some customers […]

  • Alabama ransomware attack: think before clicking on emailData Security

    Share

    Last week, if you wanted a vehicle tag or a license in Montgomery County, Alabama, you were out of luck. Hackers request bitcoins Hackers knocked many county computers offline with a ransomware attack, local officials say. The probate office took the worst of the attack, which hit late Monday, so business licenses, marriage licenses, and vehicle tags were all unavailable. (Driver’s license systems were not impacted.) So was the county sheriff’s website. “We noticed the system was acting up at about 4:55 […]

LOAD MORE ARTICLES