Get in Touch
Cryptojacking – What it is and Why it’s Done
You have to hand it to hackers. They’re constantly expanding our vocabulary. Terms like ‘ransomware botnet’ which would have elicited a quizzical if not...
Consumer Targeting: On Opting Out, Lying and Getting Got
A recent Reuters article by Tom Bergin takes a look at what data mining companies may or may not know about particular individuals in...
6 Post-Yahoo Settlement Data Breach Liability Dangers
The U.S. Securities and Exchange Commission recently toughened cybersecurity reporting guidelines for public companies, and days later Yahoo agreed to pay $80 million to settle a milestone class-action lawsuit brought by investors...
5 Things You Need to Know About Botnets
There's a common denominator between the surges of phishing email that continue to plague consumers, businesses and government agencies around the globe and the social media-fueled propaganda campaigns Russia...
Adam Levin Discusses Security Breaches, Identity theft with CBS Miami
Adam Levin was featured on a CBS Miami news piece about an identity theft victim who discovered 17 inquiries into her credit, to see...
Adam Levin Discusses the Vulnerability of Consumers on White House Chronicle...
Adam Levin appeared on the PBS program “White House Chronicle” in a wide-ranging interview touching on everything from his work as Director of Consumer...
Facebook Fail: Privacy Is Dead (Long Live… Never Mind, It’s Really...
The most remarkable aspect of the revelation Facebook allowed millions of people to unwittingly, and unwillingly, help the Trump victory machine on social media...
Government Agencies Are Under Siege From Phishing Attacks. Could Your Company...
What does the U.S. Department of Defense have in common with local town councils spread out all over the United Kingdom?
On any given day,...
Cyberattack on Saudi Facility May Indicate an Alarming New Threat
The New York Times reported this week on a hacking attempt at a petrochemical plant in Saudi Arabia last August that sought to physically...
Bombshell: Air-Gapped Computers Can Be Hacked with Speakers, Headphones, and Earbuds
Researchers at Ben-Gurion University of the Negev made a startling discovery that may change the way cybersecurity is handled in the future. One standard...