About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


  • venmo

    How to Protect Yourself on Venmo in 5 MinutesData Security, Banking

    Share

    With Venmo being one of the most popular ways to send money, it makes sense to wonder what’s keeping your personal data and digital wallet safe. Venmo has made strides to improve its security in the past two years, but here’s the short answer to how safe Venmo is—protecting yourself comes almost entirely down to you. How to Keep Your Personal Info Safe on Venmo It takes only five minutes to make your Venmo account […]

  • Is GPS hacking causing U.S. Navy ships to crash?Data Security, Technology

    Share

    For years, security researchers and consumers have been fixated on concerns around hacking cars. Maybe they should worry about ship hacking instead. Several recent collisions involving U.S. naval vessels have sparked speculation that someone or something is interfering with the ships’ ability to steer clear of other vessels in busy waters. The striking similarities between Monday’s incident involving the Navy destroyer USS John S. McCain, and June’s incident involving another destroyer, the Fitzgerald, suggest to observers some kind […]

  • dark web

    6 Things About the ‘Darknet’ All Businesses Should KnowData Security, Technology

    Share

    Preparation, execution and monetization of any high-profile data breach that comes to mind requires multiple transactions between several tiers of co-conspirators. That collaboration takes place on the Darknet. Yet despite its ominous handle, the Darknet isn’t as mysterious as you might think. In fact, some security experts say it can be an effective form of defense for a corporation to assign an IT staffer to maintain a presence there. I will come back to that in moment. First, here’s what […]

  • personal data

    12 Places Your Data May Not Be Safe (And What You Can Do)Data Security, Identity Theft

    Share

    Data compromises and the identity-related crimes that flow from them are now the third certainty in life, right behind death and taxes. That said, there is plenty you can do to stay as crime-proof as possible. According to Risk Based Security, more than 4.2 billion records were compromised worldwide in 2016 alone. In truth, the total number of compromised records is unknowable. Here’s what you do need to know: it is a near certainty that most, […]

  • Cyber attack

    The Cyber Attacks Are Going to Get Worse, But You Can Beat ThemData Security, Swiped

    Share

    If you didn’t like WannaCry, you’re really going to hate the sequel. Like the Godfather and Star Wars movie franchises, the second installment of “the world gets its bell rung by ransomware” is way better than the original. In the May WannaCry ransomware attack, users running obsolete versions of Microsoft software were affected in more than 150 countries with a purloined N.S.A.-designed exploit that let hackers encrypt files and demand a fee to restore access to them, paid […]

  • Recent HBO hack could spur better cybersecurity practicesData Security

    Share

    Add HBO to the growing list of companies victimized by a serious cybersecurity incident. According to The Associated Press, cyber criminals stole 1.5 terabytes of corporate data, including some HBO shows and sent a ransom video to CEO Richard Plepler in which the hackers demanded a ransom worth millions in bitcoin. As of this writing, there is still a lot of mystery surrounding the HBO attack. “Beyond the already released programming and ‘Game of Thrones’ episode outline, it’s unclear exactly what else the hackers might have,” Grant Rindner […]

  • Stolen data

    3 New Ways That Criminals Are Making Money Off Your Stolen DataData Security

    Share

    The treasure trove of stolen personal information which grows exponentially year after year on the Dark Web is attracting cyber criminals like ants to a picnic. Thousands of commercial, government and political entities have cumulatively lost hundreds of millions of personal records to hackers. The targets have been (and continue to be) iconic public and private sector organizations in retail, finance, health care, sports, education, energy, agencies of the state and federal governments, our election system–your friends, family and neighbors. Tip […]

  • Phone wiretapping

    The Apps Your Partner Could Be Using to Spy on YouData Security, Privacy

    Share

    “These apps are brutal,” Ondrej Krehel told me during a conversation about spyware, or “spouseware” as the software is sometimes called. “It doesn’t matter what ‘intended use’ these app developers claim in their sales pitches. They are increasingly being used by teens to spy on their love interests,” Krehel said. “It’s quite prevalent.” Krehel is CEO and founder of LIFARS, a digital forensics and cybersecurity intelligence firm. He sees spyware as a concern for consumers. […]

  • Machine learning

    As Data Multiplies, Technology Helps Tackle More Challenging Security IssuesData Security, Cybersecurity

    Share

    IT systems have never been more powerful or accessible to businesses. However, the scope and scale of cyber crimes continues to outpace tech innovation. For years, the challenge for internal IT and security teams has been to use existing company data to construct an integrated picture of oddities and unexpected actions on their network. Recent advancements in machine learning and behavior or anomaly-based analytics that leverage existing enterprise logs have provided security teams with much more accurate intelligence […]

  • gym cybersecurity

    Is Your Gym Exposing More Than Your Abs?Data Security, Identity Theft

    Share

    When Apple announced a serious hardware flaw last week, and the critical security patch that addressed it, my first thought was perhaps arbitrary: “That exploit would work at the gym.” My next thought: what else would? The discovery of a zero-day exploit affecting hardware—specifically a WiFi chip embedded in the main processors of Apple devices—was serious news. The vulnerability makes it possible for a hacker within range to “execute arbitrary code on the Wi-Fi chip.” […]

LOAD MORE ARTICLES