About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • Mac Attack: Data Breach At McDonald’s

    Data Security Blog Identity Theft 

    The list of major American consumer brands that have suffered data breaches this year has grown by one in the last few weeks. But it’s a big one – McDonald’s™. The company was recently victimized by data breaches that left the personal data of its customers exposed to cyber criminals. The fast food giant fumbled a major e-mail campaign last month, leaving a wide-open gap for online scammers to lift key data like names, birthdays, […]

  • FTC “Do Not Track” Proposal: Q&A With A Privacy Advocate

    Blog Privacy 

    Earlier this month the Federal Trade Commission formally announced a new world order that would provide more privacy options for Internet users. The cornerstone of that proposal is a universal “Do Not Track” mechanism that would allow web consumers to block access to online marketers. The proposal is viewed by privacy groups as similar to the FTC’s 2004’s “Do Not Call” registry, which gave consumers the option to block unwanted telemarketing calls to their homes. […]

  • Employment Credit Checks – Why Leave Anything to Chance?

    Blog Personal Finance 

    No doubt about it, in today’s turbulent financial times it is a buyer’s market when it comes to getting a job. Employers have access to a virtual cornucopia of qualified talent, all competing for a limited number of jobs, and a unique understanding of how cyberspace and credit reports can be effectively utilized to better vet applicants. According to the Washington-based Society of Human Resources Management (SHRM), 47% of U.S. companies conduct credit checks on […]

  • ID Theft Watch: One iPhone App Too Many

    Blog Privacy Identity Theft Technology 

    My name is Adam and I own an iPhone. In that regard, I’m not alone. I have about 85 million fellow iPhone “friends.” Sure, that’s about 415 million fewer friends than Mark Zuckerberg, the co-founder of Facebook. But still, 85 million is no trifling number. Even more telling, The New York Times reports that iPhone users are purported to be more sexually active than Blackberry or Android users. While flattering, I can’t vouch for that […]

  • Colorado’s Pot Plan: Orwellian Surveillance or Sound Law Enforcement?

    Government Blog Privacy 

    Here’s a news item that makes me sit back and scratch my chin: Colorado lawmakers and regulators are creating the nation’s first surveillance system to track the sale of medical marijuana. The state will use video cameras to track pot sales. It’s also considering additional tracking measures including fingerprints of prescription holders and radio frequency chips on pot plants. The goal is to make sure that pot buyers actually have prescriptions and that customers buy […]

  • Rocky Mountain Low: Colorado Court OKs Identity Theft

    Blog Identity Theft 

    Study after study shows that identity theft is one of the most devastating crimes an American can experience. That’s particularly true of Social Security theft, a growing threat to U.S. consumers in this, the digital age, where personal information is much as a commodity as ball bearings or Buicks. According to Javelin Strategy & Research’s 2010 Identity Fraud Survey Report, identity breaches are a huge problem in the U.S, with 32 percent of all identity […]

  • Three Strikes, the Identity Thief is OUT!

    Blog Identity Theft 

    Accused identity thief Timothy Barnett is making history in a way he never planned. The Los Angeles con man is the first alleged white-collar criminal ever charged under California’s three-strikes law. He faces 23 felonies. If convicted of any of them, he could spend the rest of his life in prison. There are those pundits who say that’s draconian because three-strikes usually is used to punish violent criminals like murderers or bank robbers. But I […]

  • Big Privacy Breaches, Big Consequences

    Blog Privacy 

    News of Tyler Clementi’s tragic suicide after the teenage Rutgers student was emotionally devastated by an online video brings to mind other cases in which webcams became spying tools, with repugnant consequences. Perhaps the most infamous involved the Lower Merion School District in suburban Philadelphia, which gave laptops to high school students. District officials activated the laptops’ webcams 42 times, capturing images of shirtless students sleeping or walking around their bedrooms. The practice was discovered […]

  • Three Ways to Fight Military Identity Theft

    Blog Identity Theft 

    Military identity theft – in which the scum of the earth (read: identity thieves) steal the identities, life savings and futures of our brave soldiers in uniform – has been a big topic recently at IdentityTheft911.com. Since our private information is saved on databases around the globe, and flies nonstop across the Internet, military identity theft can happen anywhere, to any sergeant or general. But some soldiers are especially at risk. We know from the […]

  • Mobile Banking Redux

    Blog Identity Theft Technology 

    As mentioned previously, I think using a PDA or smartphone to do your personal banking is inherently risky. But if you are compelled to use your Droid/iPhone/BlackBerry as a miniature teller, please take these basic precautions to protect your accounts, your money and your identity: Arrange your phone settings so the screen locks after a short period of inactivity. To wake your phone back up, don’t simply press a button. Secure it with a password, […]

LOAD MORE ARTICLES