Reader's Digest

Reader’s Digest Features Adam Levin’s Comments on Car Warranty Scams

Reader's Digest featured Adam Levin's comments on protecting against car warranty robocall scams.
tax scams

Beware These Tax Scams

Tax season is stressful enough without the threat of phony tax returns, stolen personal and financial data and phishing scams.
Dark Reading

Dark Reading Features Adam Levin’s Comments On Supply Chain Risk

Cybersecurity website Dark Reading featured Adam Levin's comments in an article about supply chain vulnerabilities. "ach step in the process, every link, also has a...
Apple malware update

Apple Releases Another Major Security Update

Apple released its second major security update of 2021. The updates patch a major security vulnerability in Apple’s Safari web browser that allows hackers...

Brute Force Attacks: How They Work

A brute force attack is not high-level cyberespionage. A hacker guesses the password to an account until s/he finds the right one. This trial...
Password spraying

What is Password Spraying and How to Protect Against It

The most sophisticated hacking operations often use surprisingly simple methods to gain access to major targets. Bad password hygiene is the most common culprit...
App Security

App Security is Abysmal. Some Are Riskier Than Others

Gab was breached February 28, with 70 gigabytes of user data leaked by a group of “hacktivists.”  A popular audio chatroom app for iOS...
Who You Should Be Following in Cybersecurity

Who You Should Be Following in Cybersecurity: Feb 2021

When I put together a list last month of some of the best cybersecurity experts to follow online, it was clear I’d have to...
Two-factor authentication

Here’s What You Need to Know about Two-Factor Authentication

Two-factor authentication, often shortened to 2FA, is a hassle-free way to protect yourself from some of the most common forms of hacking.  Two-factor authentication adds...
Silver Sparrow Apple Malware

Mysterious Malware Infects 30,000 Apple Computers (Don’t Panic!)

A new strain of malware is infecting Apple computers, and it can’t be removed.  “Silver Sparrow” has been found on both Intel processor-based Macs as...
Digital Spring Cleaning

It’s Time for Some Digital Spring Cleaning

March is right around the corner, and for many that means a little digital spring cleaning. This year we’re going to focus on those...
Solarwinds

Are There More Hacks Like the SolarWinds Exploit on the Way?

There are about 1,000 players in Major League Baseball. There were roughly the same number of hackers tasked with the SolarWinds hack, according to...
Ice Storm Scams

Record-Setting Ice Storms Bring Scams

With the majority of the United States in the grip of record-setting cold temperatures and ice storms and a pandemic claiming more than half...
Tax scam

Tax Season Is Open Season on Taxpayers: Everything You Need to...

The 2021 tax season may be more scam-ridden than previous years. The Covid-19 pandemic has created an enhanced threat landscape. Specifically, the great migration...
CDPR

Game Studio CD Projekt Red Hit By Ransomware Attack

When the news broke that Polish software developer CD Projekt Red (CDPR) had been hit with a ransomware attack, the company profile upstaged the...
Watering hole attack

What Is a Watering Hole Attack?

Of all of the methods used by hackers, one of the most common and perhaps least understood, is the watering hole attack.  The name of...

Adam Levin Featured on What the Tech? with Jamey Tucker

Adam Levin was featured on a segment of What the Tech with Jamey Tucker, where he discussed the implications of the ongoing pandemic of...
Poisoned Drinking Water

Hacker Allegedly Attempts to Poison Florida City’s Drinking Water

We’ve long known that systems and utilities are a target for hackers, but revelations like the one in Florida should give us all pause,...
conspiracy

How QAnon Is Getting People Hacked and Making Believers Less Secure

When it comes to conspiracy theories, a general sense of paranoia is essential. For the weirdness to thrive--human trafficking rings run out of pizza...
Phishing hook

Got Phishing Hooks? What You Need to Know about COMB

You may have heard about the mother of all data breaches over the past couple of days. More than 3.2 billion email-password pairs were...