About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • Employment Credit Checks – Why Leave Anything to Chance?

    Blog Personal Finance 

    No doubt about it, in today’s turbulent financial times it is a buyer’s market when it comes to getting a job. Employers have access to a virtual cornucopia of qualified talent, all competing for a limited number of jobs, and a unique understanding of how cyberspace and credit reports can be effectively utilized to better vet applicants. According to the Washington-based Society of Human Resources Management (SHRM), 47% of U.S. companies conduct credit checks on […]

  • ID Theft Watch: One iPhone App Too Many

    Blog Privacy Identity Theft Technology 

    My name is Adam and I own an iPhone. In that regard, I’m not alone. I have about 85 million fellow iPhone “friends.” Sure, that’s about 415 million fewer friends than Mark Zuckerberg, the co-founder of Facebook. But still, 85 million is no trifling number. Even more telling, The New York Times reports that iPhone users are purported to be more sexually active than Blackberry or Android users. While flattering, I can’t vouch for that […]

  • Colorado’s Pot Plan: Orwellian Surveillance or Sound Law Enforcement?

    Government Blog Privacy 

    Here’s a news item that makes me sit back and scratch my chin: Colorado lawmakers and regulators are creating the nation’s first surveillance system to track the sale of medical marijuana. The state will use video cameras to track pot sales. It’s also considering additional tracking measures including fingerprints of prescription holders and radio frequency chips on pot plants. The goal is to make sure that pot buyers actually have prescriptions and that customers buy […]

  • Rocky Mountain Low: Colorado Court OKs Identity Theft

    Blog Identity Theft 

    Study after study shows that identity theft is one of the most devastating crimes an American can experience. That’s particularly true of Social Security theft, a growing threat to U.S. consumers in this, the digital age, where personal information is much as a commodity as ball bearings or Buicks. According to Javelin Strategy & Research’s 2010 Identity Fraud Survey Report, identity breaches are a huge problem in the U.S, with 32 percent of all identity […]

  • Three Strikes, the Identity Thief is OUT!

    Blog Identity Theft 

    Accused identity thief Timothy Barnett is making history in a way he never planned. The Los Angeles con man is the first alleged white-collar criminal ever charged under California’s three-strikes law. He faces 23 felonies. If convicted of any of them, he could spend the rest of his life in prison. There are those pundits who say that’s draconian because three-strikes usually is used to punish violent criminals like murderers or bank robbers. But I […]

  • Big Privacy Breaches, Big Consequences

    Blog Privacy 

    News of Tyler Clementi’s tragic suicide after the teenage Rutgers student was emotionally devastated by an online video brings to mind other cases in which webcams became spying tools, with repugnant consequences. Perhaps the most infamous involved the Lower Merion School District in suburban Philadelphia, which gave laptops to high school students. District officials activated the laptops’ webcams 42 times, capturing images of shirtless students sleeping or walking around their bedrooms. The practice was discovered […]

  • Three Ways to Fight Military Identity Theft

    Blog Identity Theft 

    Military identity theft – in which the scum of the earth (read: identity thieves) steal the identities, life savings and futures of our brave soldiers in uniform – has been a big topic recently at IdentityTheft911.com. Since our private information is saved on databases around the globe, and flies nonstop across the Internet, military identity theft can happen anywhere, to any sergeant or general. But some soldiers are especially at risk. We know from the […]

  • Mobile Banking Redux

    Blog Identity Theft Technology 

    As mentioned previously, I think using a PDA or smartphone to do your personal banking is inherently risky. But if you are compelled to use your Droid/iPhone/BlackBerry as a miniature teller, please take these basic precautions to protect your accounts, your money and your identity: Arrange your phone settings so the screen locks after a short period of inactivity. To wake your phone back up, don’t simply press a button. Secure it with a password, […]

  • Security Risks of Mobile Banking

    Blog Privacy Identity Theft Technology 

    Hail the Gods of Ever More Convenience, but Alas, Beware the Demons of Ever Less Security So there I was, watching TV the other night and suddenly this provocative bank commercial came on. Imagine that… a provocative TV ad for a financial institution. A man and a woman are giggling and talking excitedly about something they have been waiting to do the entire day. The camera pans slowly, erotically, up the fluffy carpet past a […]

  • Be My Valentine – ID Theft & the Broken Heart

    Data Security Blog Privacy Identity Theft 

    There was a song from the ’30s or ’40s entitled, “How Could You Believe Me When I Said I Loved You When You Know I’ve Been A Liar All My Life.” In an age where the worlds of online dating and identity theft collide with disastrous results, for many this tune might as well be a personal soundtrack. Across the cyber universe, people are sitting in dark rooms, in front of computer monitors, anonymously typing […]

LOAD MORE ARTICLES