BOOK REVIEW: Cybersecurity Classic The Art of Deception

Cybersecurity Classic The Art of Deception

The Art of Deception is a brilliant cybersecurity book written by legendary hacker Kevin Mitnick. In stunning detail, he shares how social engineering works — how he and other hackers con people into giving up passwords, account numbers, and social security numbers. Deception is how hackers acquire the keys to the kingdom. Published in 2002, it remains a cybersecurity classic. The primary point of his book? In cybersecurity, we, humans, are the weakest link.

As executive search firm that recruits top technology executives in cybersecurity, we are a nerdy practice. That is why we recommend the hit television series Mr. Robot, a psychological thriller that follows a young programmer who works as a cyber-security engineer by day and a vigilante hacker by night. The series has made hackers human.

World’s Most Famous Hacker

Kevin Mitnick is considered by many in cybersecurity to be the world’s most famous hacker. At one point, he made the FBI’s “Most Wanted” list because he hacked into 40 major corporations. He didn’t do it for anything but the sport of it. Because it was there. To see if he could. The FBI saw it differently. Mitnick was arrested in 1995 and spend five years in prison for various computer and communications-related crimes. Mitnick was convicted of copying software unlawfully. However, Mitnick supporters found the punishment excessive, claiming many of the cybersecurity charges against him were trumped-up and not based on actual losses.

For full review and other great information refer to the source.

Source: The Good Search

Topics: Social Engineering, Speaking Engagements, technology, The Art of Deception, weakest security link, security weaknesses, cyber security, FBI, Kevin M9itnick, Password Management, Mitnick Security Consulting

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›

Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read more ›
tech-texture-bg