About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


  • Phone wiretapping

    The Apps Your Partner Could Be Using to Spy on YouData Security, Privacy

    Share

    “These apps are brutal,” Ondrej Krehel told me during a conversation about spyware, or “spouseware” as the software is sometimes called. “It doesn’t matter what ‘intended use’ these app developers claim in their sales pitches. They are increasingly being used by teens to spy on their love interests,” Krehel said. “It’s quite prevalent.” Krehel is CEO and founder of LIFARS, a digital forensics and cybersecurity intelligence firm. He sees spyware as a concern for consumers. […]

  • Machine learning

    As Data Multiplies, Technology Helps Tackle More Challenging Security IssuesData Security, Cybersecurity

    Share

    IT systems have never been more powerful or accessible to businesses. However, the scope and scale of cyber crimes continues to outpace tech innovation. For years, the challenge for internal IT and security teams has been to use existing company data to construct an integrated picture of oddities and unexpected actions on their network. Recent advancements in machine learning and behavior or anomaly-based analytics that leverage existing enterprise logs have provided security teams with much more accurate intelligence […]

  • gym cybersecurity

    Is Your Gym Exposing More Than Your Abs?Data Security, Identity Theft

    Share

    When Apple announced a serious hardware flaw last week, and the critical security patch that addressed it, my first thought was perhaps arbitrary: “That exploit would work at the gym.” My next thought: what else would? The discovery of a zero-day exploit affecting hardware—specifically a WiFi chip embedded in the main processors of Apple devices—was serious news. The vulnerability makes it possible for a hacker within range to “execute arbitrary code on the Wi-Fi chip.” […]

  • Vet your vendors

    Want to Avoid a Data Breach? Start By Taking a Close Look at Your VendorsData Security

    Share

    It has been almost four years since the massive Target data breach. Astoundingly, managing third-party risks still does not command the vigilance it should in all too many organizations. The latest proof: ten states neglected to vet America’s Joblink Alliance, the contractor behind the Joblink nationwide data base for job seekers. So by cracking into Joblink, an attacker gained access to Social Security Numbers and birth dates for citizens in Alabama, Arizona, Arkansas, Delaware, Idaho, Illinois, Kansas, Maine, Oklahoma, and […]

  • VPN

    Want to protect your small or midsize business from a breach? Set up a VPNData Security, Technology

    Share

    As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small-l and medium-size business owners. The growing popularity is a reflection of the chaotic times in enterprise computing, marked by malware and ransomware targeting vulnerable systems and a decentralized work force of globetrotting employees juggling several gadgets at once. More SMB data is now stored in the cloud, too, often leaving company executives at the mercy of the servers they […]

  • Microchipped dog

    Can Your Adopted Pet Expose You to Fraud?Data Security, Identity Theft

    Share

    Pet ownership has definite upsides. You get companionship and exercise and the satisfaction of doing a good deed. Plus, people who own pets live longer. Unfortunately, pet ownership can also make you a target for phishers, scammers and identity thieves. The Vector du Jour With 65% of U.S. households including pets (and an estimated $60 billion in spending on them), pet owners represent persons of interest for scammers. The focus here is on a nearly […]

  • Shield your data

    Keep it safe: How to shield your sensitive data and control accessData Security

    Share

    Recent high-profile photo hacks have made headlines. In March, internet hackers targeted celebrities including Miley Cyrus, Emma Watson and Amanda Seyfried, among others, resulting in the leak of intimate photos that were posted on sites such as 4chan and Reddit. Similarly, back in 2014 hacker Ryan Collins exposed nude photos and videos of several celebrities after obtaining them from iCloud accounts. But celebrities aren’t the only ones vulnerable to hackers. Imagine if your organization’s C-level executives had […]

  • biometric scan

    Why Scanning Your Fingerprint Could Cost You Your PrivacyData Security, Privacy, Technology

    Share

    You can’t change your physical traits very easily, so if a hacker steals your biometric data–look out. Scanning a fingerprint or even an eyeball to authenticate your identity is no longer the stuff of science fiction. Biometric identification has been in practical use for a while now, and the technology gets more sophisticated every day. It should come as no surprise that security and privacy concerns have arisen along the way. And now the legal ramifications are rapidly getting more complicated. […]

  • WannaCry

    White House, businesses hit snooze button after Petya, WannaCry wake-up callsData Security, Technology

    Share

    WannaCry was a wake-up call. Petya is a wake-up call. Last I checked, wake-up calls were meant to bring about change. After WannaCry, we saw a massive surge in patching around the globe, not to mention a 22-year-old “accidental hero” in the U.K. who helped halt the malicious software. It’s proof that beating the drum continuously to public and corporate institutions about serious cyber defense tactics doesn’t seem to do the trick, and once again […]

  • Ransomware

    Why The Ransomware Plague Is Only Warming UpData Security, Cybersecurity

    Share

    Ransomware continues to pose a potent threat to individuals and, increasingly, to companies. What’s worse, all signs point to ransomware attacks escalating the rest of this year and into 2017. How bad is it? Arctic Wolf Networks has measured a 433 percent spike in ransomware attacks over the past year, and the FBI says victims paid up $209 million in the first quarter of 2016, up from $24 million in all of 2015. And that only […]

LOAD MORE ARTICLES