About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • Identity theft

    How Tragedy & Identity Thieves Kept One Woman From a Near-Perfect Credit Score

    Identity Theft 

    Identity theft can deal serious damage to your finances. And repairing its effects can be stressful and time-consuming, especially when it comes to repairing the damage to your credit. Just ask New Jersey resident, Erin (who asked us not to use her last name, as she was a victim of identity theft). This, plus credit problems arising from her recently deceased parents’ financially accounts, dragged her score down by nearly 50 points, keeping her from the […]

  • Machine learning

    As Data Multiplies, Technology Helps Tackle More Challenging Security Issues

    Data Security Cybersecurity 

    IT systems have never been more powerful or accessible to businesses. However, the scope and scale of cyber crimes continues to outpace tech innovation. For years, the challenge for internal IT and security teams has been to use existing company data to construct an integrated picture of oddities and unexpected actions on their network. Recent advancements in machine learning and behavior or anomaly-based analytics that leverage existing enterprise logs have provided security teams with much more accurate intelligence […]

  • gym cybersecurity

    Is Your Gym Exposing More Than Your Abs?

    Data Security Identity Theft 

    When Apple announced a serious hardware flaw last week, and the critical security patch that addressed it, my first thought was perhaps arbitrary: “That exploit would work at the gym.” My next thought: what else would? The discovery of a zero-day exploit affecting hardware—specifically a WiFi chip embedded in the main processors of Apple devices—was serious news. The vulnerability makes it possible for a hacker within range to “execute arbitrary code on the Wi-Fi chip.” […]

  • Medical device

    Security of Medical Devices Needs Intensive Care

    Technology 

    Medical devices, such as such as pacemakers, insulin pumps and defibrillators, could become lethal in the hands of a hacker tampering with them remotely.  A new study that shows medical devices—and patients—are vulnerable to cyber attacks is a wake-up call for manufacturers, according to a Silicon Valley software company that sponsored the study. “Device manufacturers must change their culture and look at security as an equal to patient safety,” says Chris Clark, principal security engineer of strategic initiatives for Mountain […]

  • Vet your vendors

    Want to Avoid a Data Breach? Start By Taking a Close Look at Your Vendors

    Data Security 

    It has been almost four years since the massive Target data breach. Astoundingly, managing third-party risks still does not command the vigilance it should in all too many organizations. The latest proof: ten states neglected to vet America’s Joblink Alliance, the contractor behind the Joblink nationwide data base for job seekers. So by cracking into Joblink, an attacker gained access to Social Security Numbers and birth dates for citizens in Alabama, Arizona, Arkansas, Delaware, Idaho, Illinois, Kansas, Maine, Oklahoma, and […]

  • VPN

    Want to protect your small or midsize business from a breach? Set up a VPN

    Data Security Technology 

    As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small-l and medium-size business owners. The growing popularity is a reflection of the chaotic times in enterprise computing, marked by malware and ransomware targeting vulnerable systems and a decentralized work force of globetrotting employees juggling several gadgets at once. More SMB data is now stored in the cloud, too, often leaving company executives at the mercy of the servers they […]

  • IoT

    As use of IoT devices explodes, detecting vulnerabilities becomes nascent industry

    Cybersecurity 

    The number of machine-to-machine connected devices—the Internet of Things—is growing faster than the world population. Cisco estimates that M2M connections will grow from 4.9 billion in 2015 to 12.8 billion by 2020 (estimated world population in 2020: 7.7 billion). Growth in IoT security expenditures is as robust. Gartner puts endpoint IoT security spending at $1,183 billion in 2015, and estimates $3,010 billion in 2020. “Everybody’s realizing that IoT security is a serious problem,” says Xu Zou, CEO […]

  • Microchipped dog

    Can Your Adopted Pet Expose You to Fraud?

    Data Security Identity Theft 

    Pet ownership has definite upsides. You get companionship and exercise and the satisfaction of doing a good deed. Plus, people who own pets live longer. Unfortunately, pet ownership can also make you a target for phishers, scammers and identity thieves. The Vector du Jour With 65% of U.S. households including pets (and an estimated $60 billion in spending on them), pet owners represent persons of interest for scammers. The focus here is on a nearly […]

  • Shield your data

    Keep it safe: How to shield your sensitive data and control access

    Data Security 

    Recent high-profile photo hacks have made headlines. In March, internet hackers targeted celebrities including Miley Cyrus, Emma Watson and Amanda Seyfried, among others, resulting in the leak of intimate photos that were posted on sites such as 4chan and Reddit. Similarly, back in 2014 hacker Ryan Collins exposed nude photos and videos of several celebrities after obtaining them from iCloud accounts. But celebrities aren’t the only ones vulnerable to hackers. Imagine if your organization’s C-level executives had […]

  • biometric scan

    Why Scanning Your Fingerprint Could Cost You Your Privacy

    Data Security Privacy Technology 

    You can’t change your physical traits very easily, so if a hacker steals your biometric data–look out. Scanning a fingerprint or even an eyeball to authenticate your identity is no longer the stuff of science fiction. Biometric identification has been in practical use for a while now, and the technology gets more sophisticated every day. It should come as no surprise that security and privacy concerns have arisen along the way. And now the legal ramifications are rapidly getting more complicated. […]

LOAD MORE ARTICLES