Get in Touch
Reader’s Digest Features Adam Levin’s Comments on Car Warranty Scams
Reader's Digest featured Adam Levin's comments on protecting against car warranty robocall scams.
Beware These Tax Scams
Tax season is stressful enough without the threat of phony tax returns, stolen personal and financial data and phishing scams.
Dark Reading Features Adam Levin’s Comments On Supply Chain Risk
Cybersecurity website Dark Reading featured Adam Levin's comments in an article about supply chain vulnerabilities.
"ach step in the process, every link, also has a...
Apple Releases Another Major Security Update
Apple released its second major security update of 2021. The updates patch a major security vulnerability in Apple’s Safari web browser that allows hackers...
Brute Force Attacks: How They Work
A brute force attack is not high-level cyberespionage. A hacker guesses the password to an account until s/he finds the right one. This trial...
What is Password Spraying and How to Protect Against It
The most sophisticated hacking operations often use surprisingly simple methods to gain access to major targets. Bad password hygiene is the most common culprit...
App Security is Abysmal. Some Are Riskier Than Others
Gab was breached February 28, with 70 gigabytes of user data leaked by a group of “hacktivists.” A popular audio chatroom app for iOS...
Who You Should Be Following in Cybersecurity: Feb 2021
When I put together a list last month of some of the best cybersecurity experts to follow online, it was clear I’d have to...
Here’s What You Need to Know about Two-Factor Authentication
Two-factor authentication, often shortened to 2FA, is a hassle-free way to protect yourself from some of the most common forms of hacking.
Two-factor authentication adds...
Mysterious Malware Infects 30,000 Apple Computers (Don’t Panic!)
A new strain of malware is infecting Apple computers, and it can’t be removed.
“Silver Sparrow” has been found on both Intel processor-based Macs as...
It’s Time for Some Digital Spring Cleaning
March is right around the corner, and for many that means a little digital spring cleaning. This year we’re going to focus on those...
Are There More Hacks Like the SolarWinds Exploit on the Way?
There are about 1,000 players in Major League Baseball. There were roughly the same number of hackers tasked with the SolarWinds hack, according to...
Record-Setting Ice Storms Bring Scams
With the majority of the United States in the grip of record-setting cold temperatures and ice storms and a pandemic claiming more than half...
Tax Season Is Open Season on Taxpayers: Everything You Need to...
The 2021 tax season may be more scam-ridden than previous years. The Covid-19 pandemic has created an enhanced threat landscape. Specifically, the great migration...
Game Studio CD Projekt Red Hit By Ransomware Attack
When the news broke that Polish software developer CD Projekt Red (CDPR) had been hit with a ransomware attack, the company profile upstaged the...
What Is a Watering Hole Attack?
Of all of the methods used by hackers, one of the most common and perhaps least understood, is the watering hole attack.
The name of...
Adam Levin Featured on What the Tech? with Jamey Tucker
Adam Levin was featured on a segment of What the Tech with Jamey Tucker, where he discussed the implications of the ongoing pandemic of...
Hacker Allegedly Attempts to Poison Florida City’s Drinking Water
We’ve long known that systems and utilities are a target for hackers, but revelations like the one in Florida should give us all pause,...
How QAnon Is Getting People Hacked and Making Believers Less Secure
When it comes to conspiracy theories, a general sense of paranoia is essential. For the weirdness to thrive--human trafficking rings run out of pizza...
Got Phishing Hooks? What You Need to Know about COMB
You may have heard about the mother of all data breaches over the past couple of days. More than 3.2 billion email-password pairs were...