What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.

iPhone Privacy
The recent Game of Phones between the FBI and Apple underscored an area in our jurisprudence that is screaming for more clarity. If there...
Data Breach
Most data breaches happen fast — in a matter of minutes, according to a new Verizon report — but the impact on you and your...
phishing
Anyone who’s read oddly positive online reviews or happened on Twitter users with suspiciously large followings knows that the Internet is full of fakes....
smartphone security
Information security is hard. Complete security is not just virtually implausible--it is pretty close to impossible. Enter BYOD--Bring Your Own Device--and the almost, practically,...

Obamacare Tax Scam

Tax Season is fraud season.  It's prime time for fraudsters and scammers looking to steal your personal and financial data. Scammers are using confusion about...
hacked siren
It’s tempting to ignore the warning sirens that blared Dallas out of bed last Saturday night, the work of a hacker. But that would...
When a young Finnish programmer named Tatu Ylönen conjured up the Secure Shell (SSH) coding protocol in 1995, he had no inkling of the...
Shield your data
Recent high-profile photo hacks have made headlines. In March, internet hackers targeted celebrities including Miley Cyrus, Emma Watson and Amanda Seyfried, among others, resulting in the...
dark web
Preparation, execution and monetization of any high-profile data breach that comes to mind requires multiple transactions between several tiers of co-conspirators. That collaboration takes place on the Darknet. Yet despite...
UC Browser
Owned by the Alibaba Group, the UC Browser was developed by the Chinese mobile Internet company UCWeb to compete with Google’s Chrome browser, and...