About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


The Equifax Breach and the Cybersecurity Silver Bullet

Share

Some time ago, the popular show Mythbusters wanted to find out if the Lone Ranger was right about silver bullets being better than lead ones. Turns out silver bullets are actually slower and less accurate. When it comes to cybersecurity, quick-fix silver bullets are also less effective than tried-and-true approaches. The most effective cybersecurity strategies begin with two certainties: mistakes will be made, and breaches like the one that hit Equifax will keep happening. The 143 million consumers exposed […]

  • Equifax Data Breach

    Consumers must demand answers on Equifax data breachData Security, Consumer Protection

    Share

    Until murky details are cleared up, follow best practices for protecting personal information Equifax needs to start answering questions, fast. And this better be a turning point in consumer rights around use and storage of their personal information. It’s not even clear from the PR-worded statement that 143 million Social Security numbers were stolen, though that’s the clear implication. All we know is most Americans are “potentially” impacted. A bunch of driver’s license numbers were stolen, too. Really, all we […]

  • venmo

    How to Protect Yourself on Venmo in 5 MinutesData Security, Banking

    Share

    With Venmo being one of the most popular ways to send money, it makes sense to wonder what’s keeping your personal data and digital wallet safe. Venmo has made strides to improve its security in the past two years, but here’s the short answer to how safe Venmo is—protecting yourself comes almost entirely down to you. How to Keep Your Personal Info Safe on Venmo It takes only five minutes to make your Venmo account […]

  • Is GPS hacking causing U.S. Navy ships to crash?Data Security, Technology

    Share

    For years, security researchers and consumers have been fixated on concerns around hacking cars. Maybe they should worry about ship hacking instead. Several recent collisions involving U.S. naval vessels have sparked speculation that someone or something is interfering with the ships’ ability to steer clear of other vessels in busy waters. The striking similarities between Monday’s incident involving the Navy destroyer USS John S. McCain, and June’s incident involving another destroyer, the Fitzgerald, suggest to observers some kind […]

  • dark web

    6 Things About the ‘Darknet’ All Businesses Should KnowData Security, Technology

    Share

    Preparation, execution and monetization of any high-profile data breach that comes to mind requires multiple transactions between several tiers of co-conspirators. That collaboration takes place on the Darknet. Yet despite its ominous handle, the Darknet isn’t as mysterious as you might think. In fact, some security experts say it can be an effective form of defense for a corporation to assign an IT staffer to maintain a presence there. I will come back to that in moment. First, here’s what […]

  • personal data

    12 Places Your Data May Not Be Safe (And What You Can Do)Data Security, Identity Theft

    Share

    Data compromises and the identity-related crimes that flow from them are now the third certainty in life, right behind death and taxes. That said, there is plenty you can do to stay as crime-proof as possible. According to Risk Based Security, more than 4.2 billion records were compromised worldwide in 2016 alone. In truth, the total number of compromised records is unknowable. Here’s what you do need to know: it is a near certainty that most, […]

  • Cyber attack

    The Cyber Attacks Are Going to Get Worse, But You Can Beat ThemData Security, Swiped

    Share

    If you didn’t like WannaCry, you’re really going to hate the sequel. Like the Godfather and Star Wars movie franchises, the second installment of “the world gets its bell rung by ransomware” is way better than the original. In the May WannaCry ransomware attack, users running obsolete versions of Microsoft software were affected in more than 150 countries with a purloined N.S.A.-designed exploit that let hackers encrypt files and demand a fee to restore access to them, paid […]

  • Recent HBO hack could spur better cybersecurity practicesData Security

    Share

    Add HBO to the growing list of companies victimized by a serious cybersecurity incident. According to The Associated Press, cyber criminals stole 1.5 terabytes of corporate data, including some HBO shows and sent a ransom video to CEO Richard Plepler in which the hackers demanded a ransom worth millions in bitcoin. As of this writing, there is still a lot of mystery surrounding the HBO attack. “Beyond the already released programming and ‘Game of Thrones’ episode outline, it’s unclear exactly what else the hackers might have,” Grant Rindner […]

  • Stolen data

    3 New Ways That Criminals Are Making Money Off Your Stolen DataData Security

    Share

    The treasure trove of stolen personal information which grows exponentially year after year on the Dark Web is attracting cyber criminals like ants to a picnic. Thousands of commercial, government and political entities have cumulatively lost hundreds of millions of personal records to hackers. The targets have been (and continue to be) iconic public and private sector organizations in retail, finance, health care, sports, education, energy, agencies of the state and federal governments, our election system–your friends, family and neighbors. Tip […]

  • Phone wiretapping

    The Apps Your Partner Could Be Using to Spy on YouData Security, Privacy

    Share

    “These apps are brutal,” Ondrej Krehel told me during a conversation about spyware, or “spouseware” as the software is sometimes called. “It doesn’t matter what ‘intended use’ these app developers claim in their sales pitches. They are increasingly being used by teens to spy on their love interests,” Krehel said. “It’s quite prevalent.” Krehel is CEO and founder of LIFARS, a digital forensics and cybersecurity intelligence firm. He sees spyware as a concern for consumers. […]

LOAD MORE ARTICLES