About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


  • Your Identity Portfolio Can Make or Break YouData Security, Identity Theft

    Share

    No matter how good or lucky the investor, no one beats the market 100% of the time—unless, of course, you are Bobby Axelrod. There is, however, an investment portfolio that is somewhat more predictable. It works along similar lines, but it is possible to exercise significantly more control over it than equities. I’m talking about your identity portfolio. I’ve written elsewhere about your credit portfolio, which can be a wealth-builder or a weapon of individual […]

  • Cyber wall

    The National Security Nightmare the Candidates Aren’t DiscussingData Security, Politics

    Share

    Whether you love it, or it makes you want to move south of the border, Donald Trump’s Great Wall of Mexico is an idea whose time has come. That said, the Republican presidential candidate has a few things wrong. First, The Donald’s wall is misnamed. It should be called the Great Cyber Wall of America or the American Cyberdome or, at any rate, something denoting a digital information and communication protection system. The second thing […]

  • Credit Card

    Are Hackers Already Outsmarting New Chip Credit Cards?Data Security, Personal Finance

    Share

    Visa has released data showing adoption of Visa chip cards by U.S. banks and merchants is gathering steam. But the capacity for Europay-Mastercard-Visa (EMV) chip cards to swiftly and drastically reduce payment card fraud in the United States is by no means assured. Just look north to Canada, where EMV cards have been in wide use since 2011. Criminals have simply shifted fraudulent use of payment card accounts to online purchases—where the physical card does […]

  • How Tim Cook Is Securing Steve Jobs’s Legacy with EncryptionColumn, Data Security, Blog

    Share

    Steve Jobs understood what people want. His insistence on making hard things easier — for instance, using a personal computer — was an essential part of the Apple success story. Apple CEO Tim Cook has been doing the same thing — but now the “hard thing” is privacy and encryption. Apple has consistently earned top marks for its privacy and data security policies. That said, since the San Bernardino shooting, which left 14 dead and […]

  • Why Hillary Clinton’s Emails Matter This YearColumn, Data Security, Blog

    Share

    There is no shortage of punditry about former Secretary of State Hillary Clinton’s homebrew server, and the resulting fallout, aka “Emailgate.” Whether you read the commentary dedicated to killing her candidacy, or calmer voices focused on the bigger picture of national cybersecurity, Secretary Clinton gets failing marks — and rightly so. Unlike some of Secretary Clinton’s critics, I don’t believe that the email controversy is, first and foremost, proof of some deep character flaw that […]

  • INFOGRAPHIC: Where the 2016 Presidential Candidates Stand on CybersecurityData Security, Privacy, Technology

    Share

    In the 2016 presidential race, Cybersecurity has clearly taken a backseat to issues like terrorism, healthcare, and campaign finance. In a 12-month period that has seen the biggest government hack ever (the OPM data breach), a 47 percent increase in identity theft, and a proposed $19 billion security cybersecurity initiative, it’s crucial to know where the candidates stand on issues of security, privacy, and technology. Check out the infographic below to see where the candidates stand: […]

  • Hacker

    Forget Credit Cards — Hackers Want Your Uber AccountData Security, Identity Theft, Technology

    Share

    Your Uber account is about 17 times more valuable to a hacker than your credit card credentials, according to a report security company Trend Micro compiled for CNBC. They found that stolen Uber credentials sell for an average of $3.78 per account on underground online marketplaces, while bundles of credit card data are sold for 22 cents, at most. Lots of accounts are more valuable than credit card info. PayPal accounts with a guaranteed balance […]

  • Will Someone Else Be Cashing Your Tax Refund This Year?Column, Data Security, Blog

    Share

    Here is the IRS’s phone number: 800-829-1040. With an anticipated $21 billion in tax refund fraud this year, you might need it. And that figure doesn’t include losses from dodges like the IRS phone scam, which has been enjoying a renaissance of late. IRS phone frauds aren’t terribly difficult to detect. You get a call from the IRS saying you owe money and that you must pay immediately. The threat of police intervention may or […]

  • Cyber thief

    2015: The Year in Data BreachesData Security

    Share

    Every year at about this time, technology reporters typically recount the big computer crimes from the past 12 months and proclaim “The Year of the Hacker” or some such moniker. This year, it fits. Two years ago, the Target hack ushered in a new era of credit card theft awareness and ultimately helped inspire a big change in the way Americans use plastic. But as we all know, theft of credit and debit card information has a limited impact on consumers […]

  • Data Security

    How Much Credit Monitoring Are You Entitled to After a Data Breach?Data Security, Privacy, Identity Theft

    Share

    Given all of the big-name data breaches that have occurred during the past few years, there’s a good chance your personal or payment information has been compromised. There’s also a chance you’ve been offered some type of identity protection, usually in the form of free credit monitoring, by the company that suffered the breach. But how much (and what type of) protection are they legally required to provide? Well, chances are, the answer is zero. The […]

LOAD MORE ARTICLES