About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


  • Identity portfolio

    5 Tricks to Make Your Identity Portfolio More SecureData Security, Identity Theft

    Share

    I’ve written extensively about the importance of building a credit portfolio. Credit equals buying power, which, when used wisely, can lead to increased net worth. Put simply, bad credit means fewer consumer choices and a staggering number of lost opportunities in the way of deals, car-factory incentives and other credit-based transactions. No matter the purchase type, the lowest interest rates and the biggest loans go to those with the strongest credit portfolios. You can read […]

  • bad employee

    How Your Worst Employee Could Literally Put You Out of BusinessData Security, Technology

    Share

    Doubtless, you are aware that phishing (an email that looks like a company communication or something work-related containing malware) and spear phishing (the same thing from the spoofed account of a company executive) have become facts of life. Or maybe not. There are a host of reasons to be concerned. Phishing attacks are literally out of control. According to one survey published earlier this year, 85 percent of companies in the United States reported being […]

  • biometric scanner

    Is It Time to Buy a Biometric Scanner?Data Security, Identity Theft

    Share

    Identity theft is still out there, keeping pace with the latest innovations and security measures, and snaring new victims every day. With the advent of cheaper, standalone, easy-to-integrate biometric technology for authentication, is it time to buy a fingerprint scanner? What’s a Biometric Scanner? Biometric technology uses physical or biological information, like a fingerprint, retinal scan or heartbeat, to authenticate a person’s identity. You can currently purchase the most commonplace biometric scanner — that is, […]

  • nigerian scam

    Why You Need to Know About This Nigerian Hacker Ring Targeting Small BusinessesData Security, Technology

    Share

    Nigerian 419 con artists have been around seemingly forever, relentlessly sucking funds out of the bank accounts of one duped individual victim at a time. You’ve probably heard of them. These gambits revolve around tricking the victim into thinking he or she can help transfer a large sum into a U.S. bank, and make a tidy profit on the side. But now some veteran Nigerian criminals have evolved–ripping off small- and medium-sized businesses on a […]

  • How Criminals Are Probing the Internet to Illicitly Control CompaniesData Security, Technology

    Share

    When a young Finnish programmer named Tatu Ylönen conjured up the Secure Shell (SSH) coding protocol in 1995, he had no inkling of the pivotal role his creation would play in the rapid evolution of network-centric commerce. And Ylönen certainly never imagined that one day he would be consumed with spreading awareness about a darker aspect of SSH: his protocol – or, more precisely, how SSH has come to be used as part of the […]

  • hacked siren

    Hacked sirens should serve as warning that better infrastructure security is neededData Security

    Share

    It’s tempting to ignore the warning sirens that blared Dallas out of bed last Saturday night, the work of a hacker. But that would be a very serious mistake. We hear so much about the importance of securing America’s critical infrastructure systems. Then you find out that the company responsible for maintaining the Dallas outdoor warning siren network also is an office furniture moving company. In case you missed it, outdoor sirens in Dallas screeched […]

  • Computer scan

    Give your computer network a health checkupData Security, Technology

    Share

    Health awareness was celebrated across the globe last Friday on World Health Day, an event sponsored by the World Health Organization. But humans aren’t the only ones who suffer from health issues—so do computers. Here is a look at some comparable characteristics of the two species. Health Checks. Humans require assurance from their doctors from time to time that they are fit and healthy. So we schedule regular health checks to ensure we’re on the […]

  • Saks Fifth Avenue confirms data of high-net-worth individuals was exposed onlineData Security, Identity Theft

    Share

    Here’s yet another reminder that you should always have some “burner” email address accounts handy for interactions with e-commerce websites. I’ve confirmed that shoppers at Saks Fifth Avenue who had asked the firm for notifications when sold-out items were available had their personal information exposed by the firm. Some 80,000 email addresses and/or phone numbers were exposed, along with other personal nuggets—hints at where the victims worked, and what items they ordered, for example. The […]

  • Cyber attack

    Silence isn’t golden: Information sharing is key to combating cyber attacksData Security, Cybersecurity

    Share

    Cybersecurity continues to bolster the focus of national—and global—attention, with cybersecurity professionals gaining significant strides against international cyber crime. Most recently, two Russian intelligence officers and two criminal hackers were charged in a Yahoo data breach incident, which started in January 2014 and involved 500 million compromised Yahoo accounts. The U.S. Department of Justice and FBI are calling the indictments a victory for information sharing and encourage other companies to report breaches to the federal […]

  • CIA

    How bad is recent WikiLeaks document spill about CIA? Look beyond headlinesData Security, Government

    Share

    WikiLeaks got everyone’s attention again last week, with dire headlines proclaiming the entire American government spook infrastructure had just been decimated by the secret-smashing site. Julian Assange, true to form, has shared a little leaked data and promised a whole lot more. (“Less than 1%” has been shared, the site said in a tweet). The cache of stolen documents it published does have a media-friendly name, however: Vault7.Hold on to your hyperbole: There’s a lot […]

LOAD MORE ARTICLES