What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.

cyber crime
When it comes to studies, surveys and reports sent my way that dissect various nuances of the cyber wild, my cup runneth over. So, I've...
data breach
No payment card or banking information was compromised in the latest 1 billion-user breach at Yahoo, according to expert reports. But what if there...
internet
When a young Finnish programmer named Tatu Ylönen conjured up the Secure Shell (SSH) coding protocol in 1995, he had no inkling of the...
smartphone security
Information security is hard. Complete security is not just virtually implausible--it is pretty close to impossible. Enter BYOD--Bring Your Own Device--and the almost, practically,...
Your mobile devices – including smartphones, laptops and tablets ‒ are always within reach everywhere you go, whether for work, travel or entertainment. These...
Your mobile devices – including smartphones, laptops and tablets ‒ are always within reach everywhere you go, whether for work, travel or entertainment. These...
Your mobile devices – including smartphones, laptops and tablets ‒ are always within reach everywhere you go, whether for work, travel or entertainment. These...

Privacy is Good for Business

Personal information may be valuable to your business, but it's also something your customers value. Consider taking the following actions to create a culture...
Personal information may be valuable to your business, but it's also something your customers value. Consider taking the following actions to create a culture...
malware
Social media is embedded in our lives—Facebook alone had 1.79 billion daily users as of September 2016—which means cyber criminals are not far behind. As...