About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


  • (Video) Clinton: There was no classified info in my e-mailsData Security, Government, Video, Technology

    Share

    Adam Levin spoke with Liz Claman on Countdown to the Closing Bell on Fox Business about the security issues surrounding Former Secretary of State Hillary Clinton’s ‘homebrew’ e-mail server. Levin voiced his concerns: “Was it privacy? Was it security?… I always get scared when convenience trumps security.” Click the video above to see the full interview.

  • Should the Secret Service Protect Candidates Online?Column, Data Security, Government

    Share

    The Democratic and Republican gristmills got to work last week on Hillary Clinton’s “homebrew” email, and the ensuing firestorm underscored an alarming lack of cyber-savvy among the leading players of the 2016 election. It also raised a serious question: Should the Secret Service protect presidential candidates against cyber attack? News of Hillary Clinton’s use of a private email service, @clintonemail.com, hosted from her home in Chappaqua, N.Y., spread fast last week. The State Department commented […]

  • Privacy and security

    Cloud apps routinely expose sensitive dataData Security, Technology

    Share

    An alarming number of cloud-based apps used by enterprise employees don’t encrypt data at rest or require two-factor authentication. And an astounding number of employees are still uploading highly sensitive data to the cloud and sharing files on unsecured platforms, according to the Cloud Adoption Risk Report Q4 2014 from cloud security vendor Skyhigh Networks. The recent breach of 80 million records at health insurer Anthem was an example of how cloud services that don’t […]

  • Anthem breach shows need for wider encryption of sensitive dataData Security, Technology

    Share

    Media reports concerning the Anthem breach have indicated that the compromised personal information wasn’t encrypted. Encryption – strong, modern algorithms properly implemented with tight key management – is the most effective way to protect data in 2015. How do we know this? Edward Snowden, of course. He made it clear that the NSA is unable to break strong encryption. It’s likely no one else can, either. Many have expressed surprise that the Anthem data, clearly […]

  • Faked PayPal sites hard to distinguish from the real thingData Security, Technology

    Share

    Faked PayPal email notifications directing recipients to malicious websites aren’t new. But cybercriminals are getting a lot better at executing them. That’s what the discovery of a current phishing campaign designed to lure victims to click to a pair of very well-designed faked PayPal websites shows. The finding comes from researchers at OpenDNS, a free, advertising-sponsored service for making faster, more secure website connections. The fraudulent PayPal websites are virtually indistinguishable from the real PayPal.com, […]

  • Was This Billion-Dollar Bank Heist Preventable?Column, Data Security, Blog

    Share

    A funny thing happened on the way to the ATM (and depending on who you believe, may still be happening). Scratch that. For the lucky few at the right place at the right time, an awesome thing has been happening: ATMs randomly coughing up cash—and a lot of it. Like an international lottery, the phenomenon has occurred in more than 30 countries, leading to potentially as much as $1 billion in stolen funds. At first […]

  • Skin implants arrive as replacement for passwordsData Security, Technology

    Share

    CANCUN — It was a moment out of science fiction. All eyes were on Kaspersky Lab researcher Povel Torudd as he sat center stage here at the Kaspersky Security Analyst Summit late Monday, waiting to become a cyborg. Torudd volunteered to have a Near Field Communications (NFC) chip implanted in his hand by a professional body piercer using sterilized tools, a marker to show where the chip would be inserted, a scalpel and an imposing-looking […]

  • Are You Your Own Worst Enemy When It Comes to Identity Theft?Column, Data Security, Blog

    Share

    The other day a reporter asked me who’s to blame for the growing epidemic of identity-related tax fraud. I almost replied, “the government and the bad guys,” but I caught myself before committing to that inaccuracy. “We’re all to blame,” I said. I believe that breaches, and the identity theft that flows from them, have become the third certainty in life, right behind death and taxes. While it may seem like hyperbole, more than 1 […]

  • Can You Stop Medical ID Theft After the Anthem Breach?Data Security, health care

    Share

    Anthem, the second-largest health insurer in the U.S., was hit by a major data breach last week. The news broke Feb. 4, and the company posted a letter online from the president and CEO, Joseph R. Swedish. Two sentences from this letter are displayed in a large, blue box on the side of anthemfacts.com, the page created for updates on the situation: “Anthem was the target of a very sophisticated external cyber attack. Based on what […]

  • What the Anthem Hack Means For YouData Security, health care

    Share

    The nation’s second-largest health insurer has suffered a cyberattack that might become the largest hacking headache ever for American consumers. Anthem Inc. announced Wednesday that computer criminals had infiltrated its systems and stolen a treasure trove of personal information. While the firm says no medical data or credit card information was targeted or stolen, hackers made off with names, birth dates, medical IDs/Social Security numbers, street addresses, email addresses and employment information, including income data. […]

LOAD MORE ARTICLES