Cyber Security Articles & News

BOOK REVIEW: Cybersecurity Classic The Art of Deception

Cybersecurity Classic The Art of Deception

The Art of Deception is a brilliant cybersecurity book written by legendary hacker Kevin Mitnick. In stunning detail, he shares how social engineering works — how he and other hackers con people into giving up passwords, account numbers, and social security numbers. Deception is how hackers acquire the keys to the kingdom. Published in 2002, it remains a cybersecurity classic. The primary point of his book? In cybersecurity, we, humans, are the weakest link.

As executive search firm that recruits top technology executives in cybersecurity, we are a nerdy practice. That is why we recommend the hit television series Mr. Robot, a psychological thriller that follows a young programmer who works as a cyber-security engineer by day and a vigilante hacker by night. The series has made hackers human.

World’s Most Famous Hacker

Kevin Mitnick is considered by many in cybersecurity to be the world’s most famous hacker. At one point, he made the FBI’s “Most Wanted” list because he hacked into 40 major corporations. He didn’t do it for anything but the sport of it. Because it was there. To see if he could. The FBI saw it differently. Mitnick was arrested in 1995 and spend five years in prison for various computer and communications-related crimes. Mitnick was convicted of copying software unlawfully. However, Mitnick supporters found the punishment excessive, claiming many of the cybersecurity charges against him were trumped-up and not based on actual losses.

For full review and other great information refer to the source.

Source: The Good Search

Topics: Social Engineering, technology, The Art of Deception, weakest security link, security weaknesses, cybersecurity, FBI, Kevin M9itnick, keynote speaker, Passwords, Mitnick Security Consulting

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Top Techniques Used by Social Engineers

Social engineers use new techniques daily to gain unauthorized access to private systems and servers. But while new tactics are ever-arising, many “tr..

Read more ›

Lessons Learned From GoDaddy's 2021 Data Breach

The American internet domain registrar and web hosting company GoDaddy recently made the news for the latest 2021 security breach. 

Read more ›

How Social Engineering Can Affect an Organization

Organizations around the world are enrolled in security awareness training programs and taught to look out for cybercriminals who are using a hacking ..

Read more ›
tech-texture-bg