About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • The Michaels & Fox Data Breaches: Coincidence or Cohesion?

    Data Security Blog Privacy Identity Theft Technology 

    Well, two fascinating—and repellant—things happened in the last few days, which but for the broadest possible subject matter connection, would seem to be unrelated. On May 6, a group calling itself LulzSec hacked Fox Entertainment network computers and released personal information about people from the database of potential contestants for the popular Fox show “X Factor.” Five days later, the same group announced in quite caustic terms that it also had hacked Fox.com computers to […]

  • Phishing

    Bin Phishin’?

    Data Security Blog Identity Theft Technology 

    Last week, the President and Commander in Chief announced something many Americans had been anticipating (though less and less, as time passed) for nearly a decade. Osama bin Laden, the person responsible for the single largest murder of Americans in history had been found and summarily executed in a stunningly efficient covert operation carried out by the Navy Seals. Not everyone reacted with the same celebratory response seen outside the White House and at Ground […]

  • When You’re the Apple of Their Eye

    Data Security Blog Privacy Technology 

    The World Wide Web seems to be making the world less wide. Everyone is connected to everyone and everything else, and that is changing the way many things are done, particularly advertising and marketing. The past decade or so has seen a radical evolution in the way marketers define and reach their target markets. Gone are the days when the Sunday insert sufficed for advertisers looking to pinpoint potential customers. These days, advertisers want to […]

  • S&P Downgrades U.S. Debt… Will Repo Men Come for Air Force One?

    Government Banking Blog Money 

    By now, nearly every American should know that a “credit report” and a “credit score” represent a measure of our personal financial integrity.  Those reports and scores, for individuals, are kept and computed by a select number of large companies (like Equifax, TransUnion, FICO and Experian). Even though most of us have had little if any direct contact with these companies, the fact is that they are keeping files on us and that the reports […]

  • What Do Data Breaches, Globalization and Unprotected Sex Have in Common?

    Data Security Blog Identity Theft Technology 

    In the 21st century, the data breach apology letter has established itself as a new literary art form. Countless CEOs from corporations big and small as well as elected officials have had to reach out to the public and offer mea culpas that both communicate how sorry they are that this serious breach happened, and ultimately that there is nothing to worry about because nothing has happened to you … yet. So how does one […]

  • The End of Digital Innocence: What Does the Epsilon Breach Mean?

    Data Security Blog Identity Theft Technology 

    Spot Quiz: What does the word epsilon mean to you? It is the fifth letter of the Greek alphabet. As I recall, in its lowercase form, epsilon stands for elasticity, among economists. There might even be a fictional spy named Epsilon. I’ll bet that up until a few days ago you didn’t know that Epsilon was also the name of a company that has exposed millions of Americans (including you, most likely) to the increased […]

  • The CFPB and Congress’ Need for an Adult Conversation

    Government Politics Consumer Protection Blog 

    The Republicans, now in control of our House of Representatives, love to talk about having adult conversations about things, and so I can’t for the life of me figure out why, when it comes to consumer protection, certain members of the GOP insist on speaking to us all like we’re either too young or stupid to understand just how badly the American people have been hammered—both by the financial services industry and our elected and […]

  • Data Leak at Stem Cell Bank Makes My Blood Run Cold

    Data Security Blog Identity Theft 

    The database compromise club has a new member. Mazel Tov, Cord Blood Registry. You are the latest organization to fail in your responsibility to your clients by neglecting to provide even minimal security for their personal data. Your membership card is in the mail. Who is CBR? Before diving into the data leak, let’s learn a bit more about Cord Blood Registry. CBR is perhaps the world’s largest stem cell bank storing more than 350,000 […]

  • We Owe Them A Debit of Gratitude

    Government Banking Blog Money 

    And so, we begin anew. During the Great Congressional Financial Services Smackdown of 2009 and 2010, Illinois Democrat Richard Durbin inspired fellow Senators to pass an Amendment to the Dodd-Frank Act directing the Federal Reserve to study and, hopefully, reduce the relatively unknown “swipe fees” that banks collect from retailers every time a consumer uses a debit card to make a purchase. Last summer, the Federal Reserve responded with a call to cut swipe fees […]

  • When Your Facebook Account Becomes Part of the Job Application

    Social Media Consumer Protection Blog 

    This week, in honor of National Consumer Protection Week, Credit.com is highlighting a number of issues to raise consumer awareness.  Credit.com chairman and co-founder Adam Levin looks at how your private online information can too easily become public, and why you should be careful about what you post lest it come back to haunt you—in your job search, finances, and personal life. For the past couple of weeks I have been trying to wrap my […]

LOAD MORE ARTICLES