About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • Cyberthieves

    New tools automate cyber criminals’ attempts to take over corporate accounts

    Data Security Cybersecurity 

    Nearly all of the largest organizations throughout the world had their credentials exposed by cyber criminals last year, a new study has found. The study, done by London- and San Francisco-based Digital Shadows, which provides clients with information about their external digital risks, determined that 97 percent of the world’s largest 1,000 organizations had credentials exposed. The credentials are valuable to cyber criminals who “are increasingly turning to credential stuffing tools,” Digital Shadows officials say, […]

  • tax scam

    Here’s How to Make Sure You Don’t Fall for the Latest Tax Scam

    Swiped Identity Theft 

    True or False: The time for IRS-related swindles and scams is behind us — until next tax season. If you’re still reading this, you probably guessed “false.” And yep, it’s sad but true: Those pesky swindlers are still at it. Normally, when summer arrives with its parade of warm days and fewer demands on our attention, there is a quiet month or so when very little happens in the way of IRS-related activities (quarterly payments […]

  • Election hacking

    What We Learned Last Week about the Presidential Election

    Politics 

    The NSA leak about Russian efforts to hack the 2016 presidential election and the testimony of former FBI director James Comey last week revealed something that could become an extinction-level problem for the Trump administration. First, in his public testimony before the Senate Intelligence Committee, James Comey stated what we already knew to be true. Russia tried to influence American politics, specifically the outcome of a presidential race. That he was not forthcoming with the […]

  • Fake News

    ‘Fake news’ economy is a gold mine for truth hackers, propagandists

    Technology 

    Fake news is the new computer virus. That’s the conclusion I came to when reading a remarkable new report from computer security firm Trend Micro. If you doubt the massive efforts of underground “hackers” to influence you—and the massive cash they can make doing so—flip through the pages of this report. A few years ago, it could have been written about the spam, computer virus or click fraud economies. Today, “news” has been weaponized, both for […]

  • wedding scam

    5 Scary Wedding Scams to Avoid This Season

    Lifehacking Consumer Protection 

    Weddings require many important decisions and the wrong call can mean the difference between an unforgettable wonderful day and a day that makes you angry every time you think about it. The often unreasonably high expectations of families and friends and at least one spouse-to-be only makes matters more fraught. With such a high level of stress, it’s only a matter of luck that mistakes don’t get made. Scam artists are counting on that. There […]

  • VPN

    VPNs prevent marketers, others from cashing in on your browser history

    Data Security Privacy 

    Virtual private networks are back in the spotlight. In March, Congress voted to repeal rules that would have required internet service providers to get customer permission to sell their web-browsing data. ISPs are now free to market valuable customer information, triggering concern among privacy advocates. Detailed behavior profiles created by ISPs could be particularly handy tools for marketers targeting those most vulnerable to predatory sales campaigns, including the poor and tech neophytes. “Further overreaching by […]

  • Children's online safety

    Now’s the Time to Talk Online Security With Your Children

    Data Security Technology 

    Summer’s here and the time is right for getting hacked or worse, having the contents of your computer held hostage by ransomware. For a couple of carefree and extreme data-consuming months, kids everywhere will be doing whatever they want online even if you’ve tried to control them. In other words, be very afraid. Only you know if it is time to have “the talk” with your child about online security. But before you sheepishly clear […]

  • Cybersecurity experts cringe as Trump hands out his cell phone number

    Data Security Politics 

    The internet stirred earlier this week about the meaning of the word “Covfefe”—generated, one could guess, when the president fell asleep mid-tweet, phone in hand. But a more important Trump cell phone issue got far less attention. The Associated Press reported that Trump is giving out his cell phone number to world leaders so they can call him directly. Not only is this highly unusual, it creates plenty of security risks—not to mention public records issues. Earlier, […]

  • superhero

    How the Superhero Approach Can Help You Avoid Identity Theft

    Identity Theft 

    A recent Experian study found that most people still have a lot to learn about the risk of identity theft. The majority of those surveyed felt like they were safe from identity theft, but not for the right reasons. The most popular misconception was that scammers, phishers and identity thieves only target the rich and possibly famous. In reality, identity thieves target low-hanging fruit. To an identity thief, we’re all Kim Kardashian. More than half […]

  • WannaCry

    Five best practices worth repeating in wake of WannaCry attack

    Data Security 

    In the world of cybersecurity—particularly for small- and midsize businesses—progress tends to be achieved in fits and starts. Rare is the SMB that has the patience and focus to take a methodical approach to improving network security over an extended period. So when news of the WannaCry outbreak grabbed the mainstream media’s attention recently, fear among SMBs spiked and attention turned to cyber issues. However, just as quickly, it seems, the pendulum appears to be […]

LOAD MORE ARTICLES