About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


  • hackers election

    5 Ways Hackers Could Influence the ElectionData Security, Technology

    Share

    When Republican presidential nominee Donald J. Trump said he hoped the Russian government had found Hillary Clinton’s 30,000 missing emails, he wasn’t just taking a swipe at his opponent. He highlighted a very real and present danger to our democracy. While social media users were atwitter about whether or not The Donald had committed treason—for the record, he didn’t—I don’t know if his quasi-seditious braggadocio reveals anything about his loyalty to the country he hopes […]

  • iPhone Privacy

    Threat of Ransomware Growing for Mobile PhonesData Security, Technology

    Share

    There’s been a scary increase in successful ransomware attacks against large organizations this year. Specifically, hospitals have found themselves at the mercy of hackers who demand ransom payments to unlock critical system files. Recently, there have been signs that these criminals have moved on to universities, too. The University of Calgary admitted to Canadian media last month that it paid a $20,000 ransom “to address system issues.” But individuals have something new to worry about. […]

  • Password

    The Lesson Mark Zuckerberg Just Taught Everyone About Reusing PasswordsData Security, Technology

    Share

    Facebook CEO Mark Zuckerberg apparently didn’t read the warning about using different passwords to protect online accounts. Sources told The Wall Street Journal that Zuckerberg’s Twitter and Pinterest accounts were hacked over the weekend. Per the paper, Zuckerberg utilized the same password — “dadada” — to protect each account. That password had appeared last month in a database of more than 100 million usernames and passwords that was stolen from LinkedIn back in 2012, it said. Screenshots […]

  • social media hack

    The LinkedIn Password Breach Is Way Bigger Than We Thought: Here’s What You Need to DoData Security, Identity Theft

    Share

    Quick, what was your LinkedIn password in 2012? OK, now think of every password you use for every service, and make sure that LinkedIn password isn’t reused anywhere. If ever you needed a reminder not to reuse passwords, here it is. We knew that LinkedIn got hacked in 2012, but at the time we thought only 6.5 million passwords were stolen. Now, we’ve learned the real figure was more like 100 million-plus. That means your old […]

  • How the Government Is Doing a Terrible Job Protecting Your Social Security NumberColumn, Data Security, Blog

    Share

    The Social Security Administration sent 352 million notices by snail mail in 2015. With volume like that — much of it containing valuable fraud-enabled information — you’d think the SSA would have a great system for protecting sensitive personally identifiable information from the constant threat of identity-related crime. Think again. Recently, the Office of the Inspector General of the SSA published a report entitled “Social Security Administration Correspondence Containing Full Social Security Numbers.” While it […]

  • Data Breach

    Nearly All Data Breaches Happen in Minutes, Report FindsData Security, Technology

    Share

    Most data breaches happen fast — in a matter of minutes, according to a new Verizon report — but the impact on you and your credit report could make for a very long lasting financial headache. Cybercriminals institute data breaches to steal your Social Security number, credit card number, bank account information and many other forms of personal financial information. And according to the latest Verizon 2016 Data Breach Investigations Report, these thieves still find success with […]

  • Ransomware Is a Real Threat (Even to You, Apple Users)Column, Data Security

    Share

    Maybe the thought actually occurred to you that something was “phishy” about that link, but that’s so 30 seconds ago. You clicked and now your computer screen is locked. Behind that frozen screen lie your personal files — everything from photos to tax documents — all of it encrypted by a third party that promises to return access for a ransom, which is usually between $200 and $5,000, according to the FBI. Encryption can be […]

  • malware

    The Demon Spawn Malware Targeting Your Bank AccountData Security, Technology

    Share

    The internet is a strange and dangerous place, especially when it comes to your personal information. With all the hackers and scammers out there, protecting your information in cyberspace is much more of a challenge these days than simply demonstrating common sense. And you can’t just rely on your bank’s internet security measures anymore. Cyber-thieves have now found another way to target your information with a super hybrid malware combination. Recently IBM X-Force Research discovered […]

  • Privacy and security

    8 Ways to Protect Your Privacy OnlineData Security, Privacy

    Share

    The only sure thing in the world of information security is that there is no such thing as a failsafe solution. It’s crucial not only to keep abreast of the latest threats out there, but to also act as though the mission is to find your way to safety from the middle of a lawless demilitarized zone that’s lousy with enemy snipers. Sound extreme? Remember that Cold War classic “A Few Good Men” when Colonel […]

  • iPhone Privacy

    Privacy vs. Security: Where Should We Draw the Encrypted Line in the Sand?Data Security, Privacy

    Share

    The recent Game of Phones between the FBI and Apple underscored an area in our jurisprudence that is screaming for more clarity. If there is a tipping point when the protection of consumer privacy should yield to the needs of a criminal investigation, where is it? Few will dispute the obvious cases where the Constitutional rights of a citizen are disrupted by a judge who knows (or at least has access to) the legal precedents […]

LOAD MORE ARTICLES