About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • Cyber attack

    Silence isn’t golden: Information sharing is key to combating cyber attacks

    Data Security Cybersecurity 

    Cybersecurity continues to bolster the focus of national—and global—attention, with cybersecurity professionals gaining significant strides against international cyber crime. Most recently, two Russian intelligence officers and two criminal hackers were charged in a Yahoo data breach incident, which started in January 2014 and involved 500 million compromised Yahoo accounts. The U.S. Department of Justice and FBI are calling the indictments a victory for information sharing and encourage other companies to report breaches to the federal […]

  • credit card phone

    Here’s What to Do the Next Time a Business Asks for Your Credit Card by Phone or Email

    Cybersecurity Personal Finance 

    Recently, I was booking a hotel reservation for a family member and in the process was asked to provide certain information. It was a simple third-party credit card authorization. What could possibly go wrong? Plenty. Beyond the fact that I am professionally paranoid — I wrote a book about it — there are so many ways for your information to wind up in the wrong hands, especially your credit card information. When we provide our […]

  • pacemaker

    Will hackers turn your lifesaving device into a life-threatening one?

    health care Technology 

    What seemed like a farfetched scenario out of Hollywood four years ago is now yet another reality that security experts have been warning about. In the screen version, the U.S. vice president is assassinated on the TV show “Homeland” after a hacker takes control of his pacemaker and stops his heart—making it look like a heart attack. In real life, the U.S. Food and Drug Administration recently released a safety warning that St. Jude Medical […]

  • healthcare

    What GOP Health Care Means for Your Wallet

    Government Personal Finance 

    Will you be better or worse off if Republicans pass their version of health care reform? That’s the burning question for most Americans as they watch the arm wrestling going on in Washington, D.C. As with the health care debate itself, there are no easy answers. The bill being debated right now, the American Health Care Act working its way through the House of Representatives, offers strong hints about what health insurance will look like when […]

  • CIA

    How bad is recent WikiLeaks document spill about CIA? Look beyond headlines

    Data Security Government 

    WikiLeaks got everyone’s attention again last week, with dire headlines proclaiming the entire American government spook infrastructure had just been decimated by the secret-smashing site. Julian Assange, true to form, has shared a little leaked data and promised a whole lot more. (“Less than 1%” has been shared, the site said in a tweet). The cache of stolen documents it published does have a media-friendly name, however: Vault7.Hold on to your hyperbole: There’s a lot […]

  • phishing attack

    The Vice President Got Phished — Are You Next?

    Government Cybersecurity 

    America got mail this weekend, about 30 emails, according to reports. They were written as recently as last year by then-Governor Mike Pence and sent from his personal AOL account. While this is a political story, it is not about politics. It’s about a nationwide problem. The emails, released to the Indianapolis Star in response to a public records request, include state business. The revelation is that Pence used his private email account to conduct […]

  • data breach

    Cyber attacks becoming big threat for small businesses

    Cybersecurity 

    Small and midsize businesses are increasingly at risk for data breach class-action lawsuits that typically have targeted large corporations. Large companies are learning to address cyber threats. Hackers are responding by setting their sights on SMBs. It’s simply more productive and efficient to attack poorly protected companies that could take weeks or even months to notice they’ve been breached. As the risk of exposure moves downstream, the associated class-action lawsuits surely will follow. Statistics from […]

  • immigration

    How Trump’s Immigration Policy Spurred a Deportation Scam

    Government 

    For those who thought President Trump’s stance on immigration was the gossamer of election year overpromising, it’s time to adjust that thinking. The administration last week unveiled plans to target all “removable” aliens. It is a staggering number of people: 11 million. If I told you that Price Waterhouse blamed the envelope mix-up at the Oscars on a practical joke devised by Warren Beatty and provided a link to the story, would you click through? […]

  • My Friend Cayla, similar toys may not be your child’s best friend

    Identity Theft Technology 

    Germany has taken steps to allay concerns about how the “Internet of Toys” could put children in harm’s way. This past December, consumer groups concerned with child safety petitioned the Federal Trade Commission to look into a hot new doll, named My Friend Cayla, and its counterpart marketed to boys, i-Que Intelligent Robot. Privacy advocates expressed concern about the dolls’ capacity to spy on children. And now German authorities have banned these two internet-connected toys […]

  • The Latest Way Fraudsters Are Abusing Personal Information

    Identity Theft 

    According to a 2016 report from the security firm ThreatMetrix, identity thieves are working a new seam in the identity theft gold mine: online lending. There is an increase in attacks against providers of alternative lending products. The reason online lenders have attracted this unwanted attention has to do with the niche they occupy. First, they typically offer smaller loans in the $2,000 to $5,000 range. They differentiate themselves in a crowded market by providing […]

LOAD MORE ARTICLES