About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • Cyber attack

    The Cyber Attacks Are Going to Get Worse, But You Can Beat Them

    Data Security Swiped 

    If you didn’t like WannaCry, you’re really going to hate the sequel. Like the Godfather and Star Wars movie franchises, the second installment of “the world gets its bell rung by ransomware” is way better than the original. In the May WannaCry ransomware attack, users running obsolete versions of Microsoft software were affected in more than 150 countries with a purloined N.S.A.-designed exploit that let hackers encrypt files and demand a fee to restore access to them, paid […]

  • Recent HBO hack could spur better cybersecurity practices

    Data Security 

    Add HBO to the growing list of companies victimized by a serious cybersecurity incident. According to The Associated Press, cyber criminals stole 1.5 terabytes of corporate data, including some HBO shows and sent a ransom video to CEO Richard Plepler in which the hackers demanded a ransom worth millions in bitcoin. As of this writing, there is still a lot of mystery surrounding the HBO attack. “Beyond the already released programming and ‘Game of Thrones’ episode outline, it’s unclear exactly what else the hackers might have,” Grant Rindner […]

  • phone surveillance

    The Hidden Cost of Verizon’s ‘Free’ Rewards Program

    Privacy 

    With the announcement of Verizon Up, a new wireless rewards program that provides users with customer incentives, first-dibs opportunities on things like VIP tickets and other exclusive deals, we thought it was time to review how reward marketing plans work. First, the good news: Verizon Up is free! Like their intrusive cousin the loyalty program, reward-based marketing schemes usually require no additional fees. In essence, Verizon Up is a camouflaged version of what author Seth […]

  • Stolen data

    3 New Ways That Criminals Are Making Money Off Your Stolen Data

    Data Security 

    The treasure trove of stolen personal information which grows exponentially year after year on the Dark Web is attracting cyber criminals like ants to a picnic. Thousands of commercial, government and political entities have cumulatively lost hundreds of millions of personal records to hackers. The targets have been (and continue to be) iconic public and private sector organizations in retail, finance, health care, sports, education, energy, agencies of the state and federal governments, our election system–your friends, family and neighbors. Tip […]

  • Phone wiretapping

    The Apps Your Partner Could Be Using to Spy on You

    Data Security Privacy 

    “These apps are brutal,” Ondrej Krehel told me during a conversation about spyware, or “spouseware” as the software is sometimes called. “It doesn’t matter what ‘intended use’ these app developers claim in their sales pitches. They are increasingly being used by teens to spy on their love interests,” Krehel said. “It’s quite prevalent.” Krehel is CEO and founder of LIFARS, a digital forensics and cybersecurity intelligence firm. He sees spyware as a concern for consumers. […]

  • Identity theft

    How Tragedy & Identity Thieves Kept One Woman From a Near-Perfect Credit Score

    Identity Theft 

    Identity theft can deal serious damage to your finances. And repairing its effects can be stressful and time-consuming, especially when it comes to repairing the damage to your credit. Just ask New Jersey resident, Erin (who asked us not to use her last name, as she was a victim of identity theft). This, plus credit problems arising from her recently deceased parents’ financially accounts, dragged her score down by nearly 50 points, keeping her from the […]

  • Machine learning

    As Data Multiplies, Technology Helps Tackle More Challenging Security Issues

    Data Security Cybersecurity 

    IT systems have never been more powerful or accessible to businesses. However, the scope and scale of cyber crimes continues to outpace tech innovation. For years, the challenge for internal IT and security teams has been to use existing company data to construct an integrated picture of oddities and unexpected actions on their network. Recent advancements in machine learning and behavior or anomaly-based analytics that leverage existing enterprise logs have provided security teams with much more accurate intelligence […]

  • gym cybersecurity

    Is Your Gym Exposing More Than Your Abs?

    Data Security Identity Theft 

    When Apple announced a serious hardware flaw last week, and the critical security patch that addressed it, my first thought was perhaps arbitrary: “That exploit would work at the gym.” My next thought: what else would? The discovery of a zero-day exploit affecting hardware—specifically a WiFi chip embedded in the main processors of Apple devices—was serious news. The vulnerability makes it possible for a hacker within range to “execute arbitrary code on the Wi-Fi chip.” […]

  • Medical device

    Security of Medical Devices Needs Intensive Care

    Technology 

    Medical devices, such as such as pacemakers, insulin pumps and defibrillators, could become lethal in the hands of a hacker tampering with them remotely.  A new study that shows medical devices—and patients—are vulnerable to cyber attacks is a wake-up call for manufacturers, according to a Silicon Valley software company that sponsored the study. “Device manufacturers must change their culture and look at security as an equal to patient safety,” says Chris Clark, principal security engineer of strategic initiatives for Mountain […]

  • Vet your vendors

    Want to Avoid a Data Breach? Start By Taking a Close Look at Your Vendors

    Data Security 

    It has been almost four years since the massive Target data breach. Astoundingly, managing third-party risks still does not command the vigilance it should in all too many organizations. The latest proof: ten states neglected to vet America’s Joblink Alliance, the contractor behind the Joblink nationwide data base for job seekers. So by cracking into Joblink, an attacker gained access to Social Security Numbers and birth dates for citizens in Alabama, Arizona, Arkansas, Delaware, Idaho, Illinois, Kansas, Maine, Oklahoma, and […]

LOAD MORE ARTICLES