About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


  • The Weakest Link: Feds Fail with Cyber Security ProposalData Security, Blog

    Share

    Last week I expressed my concern over efforts in Congress to delay, defang and ultimately defund the Consumer Financial Protection Bureau. I called upon consumers to rebel against being treated as little more than pachyderm toe-jam and to send a clear message in 2012 to those in Congress who have been the spear carriers for business. My consternation over the GOP’s crusade to derail the first truly powerful and focused national consumer protection agency, however, […]

  • Herding Cats: Regulating Online TrackingData Security, Blog, Privacy, Technology

    Share

    There was a time, when the World Wide Web was young, that many entrepreneurs counted on the idea they could make money the old-fashioned way–by charging cyber-customers on a per-use basis, the same way they charged traditional brick-and-mortar patrons. Most print magazines, for example, felt they could make a seamless transition from paid print subscriptions to paid Internet subscriptions. Newspapers believed that some of their traditional departments, such as classifieds, would become huge profit centers […]

  • The Michaels & Fox Data Breaches: Coincidence or Cohesion?Data Security, Blog, Privacy, Identity Theft, Technology

    Share

    Well, two fascinating—and repellant—things happened in the last few days, which but for the broadest possible subject matter connection, would seem to be unrelated. On May 6, a group calling itself LulzSec hacked Fox Entertainment network computers and released personal information about people from the database of potential contestants for the popular Fox show “X Factor.” Five days later, the same group announced in quite caustic terms that it also had hacked Fox.com computers to […]

  • Phishing

    Bin Phishin’?Data Security, Blog, Identity Theft, Technology

    Share

    Last week, the President and Commander in Chief announced something many Americans had been anticipating (though less and less, as time passed) for nearly a decade. Osama bin Laden, the person responsible for the single largest murder of Americans in history had been found and summarily executed in a stunningly efficient covert operation carried out by the Navy Seals. Not everyone reacted with the same celebratory response seen outside the White House and at Ground […]

  • When You’re the Apple of Their EyeData Security, Blog, Privacy, Technology

    Share

    The World Wide Web seems to be making the world less wide. Everyone is connected to everyone and everything else, and that is changing the way many things are done, particularly advertising and marketing. The past decade or so has seen a radical evolution in the way marketers define and reach their target markets. Gone are the days when the Sunday insert sufficed for advertisers looking to pinpoint potential customers. These days, advertisers want to […]

  • What Do Data Breaches, Globalization and Unprotected Sex Have in Common?Data Security, Blog, Identity Theft, Technology

    Share

    In the 21st century, the data breach apology letter has established itself as a new literary art form. Countless CEOs from corporations big and small as well as elected officials have had to reach out to the public and offer mea culpas that both communicate how sorry they are that this serious breach happened, and ultimately that there is nothing to worry about because nothing has happened to you … yet. So how does one […]

  • The End of Digital Innocence: What Does the Epsilon Breach Mean?Data Security, Blog, Identity Theft, Technology

    Share

    Spot Quiz: What does the word epsilon mean to you? It is the fifth letter of the Greek alphabet. As I recall, in its lowercase form, epsilon stands for elasticity, among economists. There might even be a fictional spy named Epsilon. I’ll bet that up until a few days ago you didn’t know that Epsilon was also the name of a company that has exposed millions of Americans (including you, most likely) to the increased […]

  • Data Leak at Stem Cell Bank Makes My Blood Run ColdData Security, Blog, Identity Theft

    Share

    The database compromise club has a new member. Mazel Tov, Cord Blood Registry. You are the latest organization to fail in your responsibility to your clients by neglecting to provide even minimal security for their personal data. Your membership card is in the mail. Who is CBR? Before diving into the data leak, let’s learn a bit more about Cord Blood Registry. CBR is perhaps the world’s largest stem cell bank storing more than 350,000 […]

  • The Javelin Conundrum: Making Sense of the Latest Identity Theft NumbersData Security, Blog, Identity Theft

    Share

    At first blush one might be cheered by the results of the newly released Javelin Strategy & Research 2010 Identity Fraud Survey Report. The Good News Identity fraud incidents decreased in the United States by 28%. That’s three million less victims than reported in their findings in 2009. The total overall fraud amount dropped from $56 billion to $37 billion in 2010. The mean loss per consumer dropped from just under $5,000 to just over […]

  • Mac Attack: Data Breach At McDonald’sData Security, Blog, Identity Theft

    Share

    The list of major American consumer brands that have suffered data breaches this year has grown by one in the last few weeks. But it’s a big one – McDonald’s™. The company was recently victimized by data breaches that left the personal data of its customers exposed to cyber criminals. The fast food giant fumbled a major e-mail campaign last month, leaving a wide-open gap for online scammers to lift key data like names, birthdays, […]

LOAD MORE ARTICLES