About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • How Criminals Are Probing the Internet to Illicitly Control Companies

    Data Security Technology 

    When a young Finnish programmer named Tatu Ylönen conjured up the Secure Shell (SSH) coding protocol in 1995, he had no inkling of the pivotal role his creation would play in the rapid evolution of network-centric commerce. And Ylönen certainly never imagined that one day he would be consumed with spreading awareness about a darker aspect of SSH: his protocol – or, more precisely, how SSH has come to be used as part of the […]

  • hacked siren

    Hacked sirens should serve as warning that better infrastructure security is needed

    Data Security 

    It’s tempting to ignore the warning sirens that blared Dallas out of bed last Saturday night, the work of a hacker. But that would be a very serious mistake. We hear so much about the importance of securing America’s critical infrastructure systems. Then you find out that the company responsible for maintaining the Dallas outdoor warning siren network also is an office furniture moving company. In case you missed it, outdoor sirens in Dallas screeched […]

  • Easter scam

    6 Easter Scams You Want to Avoid

    Consumer Protection Swiped 

    Easter is a time for family, colorful parties and egg hunts, but sadly it also attracts scam artists looking to make a quick buck during the high-fructose corn syrup free-for-all. There are all stripes of Eastertime cons and scams waiting for you if you’re not paying attention — or even if you are. Some don’t really qualify as scams, whether we’re talking about those colorful plastic eggs for storing treats, sometimes loaded with lead paint, […]

  • Computer scan

    Give your computer network a health checkup

    Data Security Technology 

    Health awareness was celebrated across the globe last Friday on World Health Day, an event sponsored by the World Health Organization. But humans aren’t the only ones who suffer from health issues—so do computers. Here is a look at some comparable characteristics of the two species. Health Checks. Humans require assurance from their doctors from time to time that they are fit and healthy. So we schedule regular health checks to ensure we’re on the […]

  • Privacy

    Will We Ever Stop Bugging Ourselves?

    Privacy Technology 

    We live in an age of hackers. They are employed by our government and deployed by foreign powers. They are freelancers with goals ranging from netting big consulting fees in exchange for the discovery of potentially damaging vulnerabilities before they make the evening news, to sending a message, to righting a perceived wrong, to outright criminal activity. While the various hacker camps are different, they present the same conundrum to all of us: Is anything […]

  • Get Ready For the Medical ID Fraud Crisis

    health care Identity Theft 

    It is a documented fact that unscrupulous healthcare professionals – and dishonest patients – file more than $77 billion worth of fraudulent Medicare and Medicaid claims on an annual basis. Meanwhile, cyber criminals have been busy the past two years pilfering medical ID data for tens of millions of citizens, as well as business records from hundreds, if not thousands, of healthcare service providers and insurers. These two malevolent forces are on a collision course. […]

  • Saks Fifth Avenue confirms data of high-net-worth individuals was exposed online

    Data Security Identity Theft 

    Here’s yet another reminder that you should always have some “burner” email address accounts handy for interactions with e-commerce websites. I’ve confirmed that shoppers at Saks Fifth Avenue who had asked the firm for notifications when sold-out items were available had their personal information exposed by the firm. Some 80,000 email addresses and/or phone numbers were exposed, along with other personal nuggets—hints at where the victims worked, and what items they ordered, for example. The […]

  • vacation scam

    How to Enjoy Your Vacation Without Getting Scammed

    Consumer Protection Identity Theft 

    Spring has begun, which means open season on travelers who aren’t well-versed in the various scams waiting for them on the seamier side of paradise. While the scams abound, being forewarned is forearmed. Here are some typical scams that can ruin your vacation, drawn from my book Swiped: How to Protect Yourself in a World Filled with Scammers, Phishers, and Identity Thieves. 1. Asocial Media? One seldom publicized use of social media (at least in […]

  • Cyber attack

    Silence isn’t golden: Information sharing is key to combating cyber attacks

    Data Security Cybersecurity 

    Cybersecurity continues to bolster the focus of national—and global—attention, with cybersecurity professionals gaining significant strides against international cyber crime. Most recently, two Russian intelligence officers and two criminal hackers were charged in a Yahoo data breach incident, which started in January 2014 and involved 500 million compromised Yahoo accounts. The U.S. Department of Justice and FBI are calling the indictments a victory for information sharing and encourage other companies to report breaches to the federal […]

  • credit card phone

    Here’s What to Do the Next Time a Business Asks for Your Credit Card by Phone or Email

    Cybersecurity Personal Finance 

    Recently, I was booking a hotel reservation for a family member and in the process was asked to provide certain information. It was a simple third-party credit card authorization. What could possibly go wrong? Plenty. Beyond the fact that I am professionally paranoid — I wrote a book about it — there are so many ways for your information to wind up in the wrong hands, especially your credit card information. When we provide our […]

LOAD MORE ARTICLES