About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • How to Find and Close Your Old Online Accounts

    Lifehacking Personal Finance 

    I remember my first online accounts. I just wish I could find them. When I was a teenager, there was some blogging or profile site most people in my school had, and I can’t for the life of me remember what it was (I’m pretty sure it wasn’t Friendster, MySpace, Xanga or LiveJournal — I really have no idea). I do remember my page having a black background and lime green text, and there was […]

  • How Banks Want to Change Mobile Privacy Laws

    Column Banking Blog 

    According to the Telephone Consumer Protection Act, it’s illegal to robocall a mobile phone number without permission. The American Bankers Association wants to change that, arguing that robocalls will help fight identity theft and other kinds of fraud. Opponents say that’s an overreach, one that will erode an important consumer protection. “Gee, I can’t talk right now. Why don’t you give me your home number and I’ll call you later.” That’s how Jerry Seinfeld memorably […]

  • Credit vs Debit

    What Happens If I Swipe My Debit Card as ‘Credit’?

    Consumer Protection Personal Finance 

    It’s a question we’ve all heard when shopping: “Credit or debit?” It seems straightforward, just the cashier asking you what type of payment card you’re using, but there’s actually a lot more history to that question than you might think. Debit and credit transactions are processed differently: Here’s how MasterCard explained it in an emailed statement to Credit.com: When you use a debit card and your PIN (personal identification number), the transaction is completed in […]

  • Obama’s Cybersecurity Plan: Do As I Say, Not As I Do

    Column Data Security Blog 

    “If we’re going to be connected, then we need to be protected,” President Obama proclaimed at the Federal Trade Commission on Monday. In wide-ranging remarks, the president expressed what should be a self-evident truth, but is not yet a reality in the new digital age: “As Americans, we shouldn’t have to forfeit our basic privacy when we go online to do our business.” He is dead right. But having spent the past decade focusing on […]

  • social media hack

    It’s Tax Season. Do You Know Where Your Mail Is?

    Column Data Security Blog 

    During the holiday season a missed or stolen package can be aggravating, which is doubtless why you eagerly watched for deliveries all December, calling the nanosecond you suspected a problem. Unfortunately, many employers don’t send tracking numbers when the packet of vital documents marked “Important Tax Information Enclosed” hits the mail destined for your home address. We receive some of the most sensitive, potentially damaging mail deliveries of the year during these post-holiday months, and […]

  • How the Sony Hack Is Changing the Way I Work

    Technology 

      If the past two years have revealed anything, it’s that every conceivable mode of communication comes with its share of serious privacy and security issues. Email can be hijacked, mail servers can be breached and malware can turn your smartphone into a peepshow. Wikileaks revealed that even our phone conversations are at risk. That said, don’t panic! It’s highly unlikely anyone is listening to your phone calls. (OK, it’s possible, but you’d have to […]

  • Is Your Christmas Present Spying On You?

    Column Data Security Blog Technology 

    T’was the night after Christmas, when all through the house Every stripe of device with no need of a mouse Sent oodles of data to that Cloud in the Air While their owners slept soundly, with nary a care… When it comes to gifts from the Internet of Things department, there’s no jolly guy in a white-trimmed red suit with a bag full of presents, no magic reindeer clip-clopping on the roof. In fact, it’s […]

  • The Most Important Lessons You Can Learn From the Sony Hack

    Column Data Security Blog 

    Angelina Jolie may have been all thorns when she ran into Sony’s Amy Pascal last week after the hacker group Guardians of Peace leaked the co-chair’s email rant about the “Maleficent” star, but while the gossip mill grinds and the spin doctors do their best to stop the bleeding at the company, the real lesson here revolves around a question of corporate culture. It is important not to understate what happened. While I doubt the […]

  • 5 Big Privacy Predictions for 2015

    Column Data Security Blog 

    It seems like there were more companies that had privacy-related problems in 2014 than didn’t. And the lucky ones that didn’t “get got” were separated by only one or two degrees from those that did. As we look ahead to 2015, I see a mix of old privacy concerns along with a few emerging dangers. Breaches are the new normal. Sony Pictures, the U.S. Postal Service, Home Depot, JPMorgan Chase, Goodwill, Staples, eBay, P.F. Chang’s, […]

  • Mistake

    The Best Privacy Solution? Assume There is None.

    Privacy 

    The folks at Dictionary.com chose “privacy” as their word of the year in 2013. It was a long journey to that distinction, during which it inexorably became the engine driving more companies than not. Privacy is the consumer-consequence manifestation of big data, which increasingly shapes approaches to marketing, product development and a vast array of services. In short, privacy has become a price of consumption. For years, popular opinion held that the threat of identity […]

LOAD MORE ARTICLES