About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • (Video) Clinton: There was no classified info in my e-mails

    Data Security Government Video Technology 

    Adam Levin spoke with Liz Claman on Countdown to the Closing Bell on Fox Business about the security issues surrounding Former Secretary of State Hillary Clinton’s ‘homebrew’ e-mail server. Levin voiced his concerns: “Was it privacy? Was it security?… I always get scared when convenience trumps security.” Click the video above to see the full interview.

  • Should the Secret Service Protect Candidates Online?

    Column Data Security Government 

    The Democratic and Republican gristmills got to work last week on Hillary Clinton’s “homebrew” email, and the ensuing firestorm underscored an alarming lack of cyber-savvy among the leading players of the 2016 election. It also raised a serious question: Should the Secret Service protect presidential candidates against cyber attack? News of Hillary Clinton’s use of a private email service, @clintonemail.com, hosted from her home in Chappaqua, N.Y., spread fast last week. The State Department commented […]

  • Credit Card Interest Rate

    UAE Bank Issues Scented Credit Card

    Personal Finance Humor 

    A bank in the Middle East released a scented credit card in January, targeting women with this financial product that doubles as a medium for self-expression. Al Hilal, the bank, says it’s the first scented credit card in the United Arab Emirates. It may be new to the UAE, but scented credit cards were introduced a while ago. Japan Credit Bureau introduced a scented credit card (also aimed at women) in 2005, though it’s unclear […]

  • The Solution to Tax Identity Theft: Slower Refunds

    Column Blog 

    The Government Accountability Office estimates that $5.8 billion was lost to identity thieves filing fraudulent tax returns in 2013 and that there may have been as much as $24.2 billion in thwarted attempts. Tax identity theft losses are estimated to reach $21 billion by 2016, according to the Treasury Inspector General Tax Administration. While the massive loss chronicled in the GAO report was big news (for a nanosecond anyway) the GAO’s recommendations for stemming the […]

  • Privacy and security

    Cloud apps routinely expose sensitive data

    Data Security Technology 

    An alarming number of cloud-based apps used by enterprise employees don’t encrypt data at rest or require two-factor authentication. And an astounding number of employees are still uploading highly sensitive data to the cloud and sharing files on unsecured platforms, according to the Cloud Adoption Risk Report Q4 2014 from cloud security vendor Skyhigh Networks. The recent breach of 80 million records at health insurer Anthem was an example of how cloud services that don’t […]

  • Cyber thief

    Viral Gmail, YouTube alerts spreading via email

    Technology 

    I’ve received a couple of troubling emails recently that made their way into my inbox. They were well-drafted attacks designed to convince me that my Gmail or YouTube account were about to be deleted unless I clicked a link right away. Of course, words like “warning” or “instant” should always give you pause — criminals try to get you off your game by creating a false sense of urgency. I could see someone falling for […]

  • Tax return

    What We Could Have Done With the $5.8 Billion the Government Lost to Tax ID Theft

    Column Government Blog Identity Theft 

    Imagine you were President, or Speaker of the House, and one day you woke up and discovered that you had an extra $5.8 billion dollars to spend. What would you do with the cash? A new aircraft carrier (or half of one, anyway)? Perhaps a couple of bridges to somewhere or a new highway? A quaint premise, indeed, but not as far-fetched as you might think, considering the amount of money American taxpayers have been […]

  • 3 Ways to Protect Your Kids From ID Theft After Data Breaches

    Identity Theft 

    When a widespread data breach happens, children are often the most at risk for identity theft. Their clean credit histories make them targets for identity thieves to steal information and open new lines of credit. After the Anthem data breach, millions of children in the U.S. had their personal information exposed, making them vulnerable to identity theft. As children are highly at risk, parents should take precautions after data breaches to prevent identity theft. Here […]

  • Anthem breach shows need for wider encryption of sensitive data

    Data Security Technology 

    Media reports concerning the Anthem breach have indicated that the compromised personal information wasn’t encrypted. Encryption – strong, modern algorithms properly implemented with tight key management – is the most effective way to protect data in 2015. How do we know this? Edward Snowden, of course. He made it clear that the NSA is unable to break strong encryption. It’s likely no one else can, either. Many have expressed surprise that the Anthem data, clearly […]

  • Faked PayPal sites hard to distinguish from the real thing

    Data Security Technology 

    Faked PayPal email notifications directing recipients to malicious websites aren’t new. But cybercriminals are getting a lot better at executing them. That’s what the discovery of a current phishing campaign designed to lure victims to click to a pair of very well-designed faked PayPal websites shows. The finding comes from researchers at OpenDNS, a free, advertising-sponsored service for making faster, more secure website connections. The fraudulent PayPal websites are virtually indistinguishable from the real PayPal.com, […]

LOAD MORE ARTICLES