About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • Faked PayPal sites hard to distinguish from the real thing

    Data Security Technology 

    Faked PayPal email notifications directing recipients to malicious websites aren’t new. But cybercriminals are getting a lot better at executing them. That’s what the discovery of a current phishing campaign designed to lure victims to click to a pair of very well-designed faked PayPal websites shows. The finding comes from researchers at OpenDNS, a free, advertising-sponsored service for making faster, more secure website connections. The fraudulent PayPal websites are virtually indistinguishable from the real PayPal.com, […]

  • Was This Billion-Dollar Bank Heist Preventable?

    Column Data Security Blog 

    A funny thing happened on the way to the ATM (and depending on who you believe, may still be happening). Scratch that. For the lucky few at the right place at the right time, an awesome thing has been happening: ATMs randomly coughing up cash—and a lot of it. Like an international lottery, the phenomenon has occurred in more than 30 countries, leading to potentially as much as $1 billion in stolen funds. At first […]

  • Skin implants arrive as replacement for passwords

    Data Security Technology 

    CANCUN — It was a moment out of science fiction. All eyes were on Kaspersky Lab researcher Povel Torudd as he sat center stage here at the Kaspersky Security Analyst Summit late Monday, waiting to become a cyborg. Torudd volunteered to have a Near Field Communications (NFC) chip implanted in his hand by a professional body piercer using sterilized tools, a marker to show where the chip would be inserted, a scalpel and an imposing-looking […]

  • Are You Your Own Worst Enemy When It Comes to Identity Theft?

    Column Data Security Blog 

    The other day a reporter asked me who’s to blame for the growing epidemic of identity-related tax fraud. I almost replied, “the government and the bad guys,” but I caught myself before committing to that inaccuracy. “We’re all to blame,” I said. I believe that breaches, and the identity theft that flows from them, have become the third certainty in life, right behind death and taxes. While it may seem like hyperbole, more than 1 […]

  • Is Your Smart TV Listening to You?

    Privacy 

    “Samsung may collect and your device may capture voice commands and associated texts so that we can provide you with Voice Recognition features and evaluate and improve the features. Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition. If you do not enable Voice Recognition, you will not be able […]

  • Can You Stop Medical ID Theft After the Anthem Breach?

    Data Security health care 

    Anthem, the second-largest health insurer in the U.S., was hit by a major data breach last week. The news broke Feb. 4, and the company posted a letter online from the president and CEO, Joseph R. Swedish. Two sentences from this letter are displayed in a large, blue box on the side of anthemfacts.com, the page created for updates on the situation: “Anthem was the target of a very sophisticated external cyber attack. Based on what […]

  • What the Anthem Hack Means For You

    Data Security health care 

    The nation’s second-largest health insurer has suffered a cyberattack that might become the largest hacking headache ever for American consumers. Anthem Inc. announced Wednesday that computer criminals had infiltrated its systems and stolen a treasure trove of personal information. While the firm says no medical data or credit card information was targeted or stolen, hackers made off with names, birth dates, medical IDs/Social Security numbers, street addresses, email addresses and employment information, including income data. […]

  • Your Anonymous Credit Card Data Isn’t So Anonymous

    Column Data Security Blog 

    A recent report in Science Magazine revealed the soft underbelly of what was once considered a well-armored use of “anonymized” consumer information. The study’s authors were able to successfully identify consumers based on several anonymized data sets—specifically, their credit card purchases. Using purchase metadata with no credit card numbers, names or any other simple identifiers, the report’s co-authors found they could track a specific person’s purchases using three factors: a receipt, an Instagram and a […]

  • Are Smart Homes a Privacy Risk?

    Lifehacking Technology 

    Imagine the home of the future. While these smart homes may not be connected to transportation pods like in “The Jetsons” or have pizza hydrators like in “Back to the Future Part II,” one thing’s for sure: Abodes will be increasingly high-tech, relying on the Internet to function. The enhanced connectivity in smart homes could result in a rise in hacking risks. In 2015, things that were not Internet-enabled in the past — like thermometers and […]

  • Personal Loan

    6 Signs it May Be Time to Switch Banks

    Financial Literacy Personal Finance 

    With the new year under way, many of us have been trying to break bad habits and instill new ones in our lives for 2015. Perhaps you’re looking to increase positive relationships and influences while eliminating negative ones. While you’re assessing these positive moves, it’s a good idea to include your bank. That’s right, this can be a good time to look at how your bank is treating you. Check out the following signs it may be […]

LOAD MORE ARTICLES