BOOK REVIEW: Cybersecurity Classic The Art of Deception

Cybersecurity Classic The Art of Deception

The Art of Deception is a brilliant cybersecurity book written by legendary hacker Kevin Mitnick. In stunning detail, he shares how social engineering works — how he and other hackers con people into giving up passwords, account numbers, and social security numbers. Deception is how hackers acquire the keys to the kingdom. Published in 2002, it remains a cybersecurity classic. The primary point of his book? In cybersecurity, we, humans, are the weakest link.

As executive search firm that recruits top technology executives in cybersecurity, we are a nerdy practice. That is why we recommend the hit television series Mr. Robot, a psychological thriller that follows a young programmer who works as a cyber-security engineer by day and a vigilante hacker by night. The series has made hackers human.

World’s Most Famous Hacker

Kevin Mitnick is considered by many in cybersecurity to be the world’s most famous hacker. At one point, he made the FBI’s “Most Wanted” list because he hacked into 40 major corporations. He didn’t do it for anything but the sport of it. Because it was there. To see if he could. The FBI saw it differently. Mitnick was arrested in 1995 and spend five years in prison for various computer and communications-related crimes. Mitnick was convicted of copying software unlawfully. However, Mitnick supporters found the punishment excessive, claiming many of the cybersecurity charges against him were trumped-up and not based on actual losses.

For full review and other great information refer to the source.

Source: The Good Search

Topics: Social Engineering, technology, The Art of Deception, weakest security link, security weaknesses, cybersecurity, FBI, Kevin M9itnick, keynote speaker, Passwords, Mitnick Security Consulting

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

6 FAQs From CISOs About the Pentesting Process

As a Chief Information Security Officer (CISO), you have the responsibility of not only directing your organization’s security but also conveying your..

Read more ›

What You Get When You Invest in Mitnick Red Team Pentesting

A data breach can have extremely negative impacts on businesses, including financial losses as well as harm to their reputation with clients, customer..

Read more ›

Cyber Security Penetration Testing for Multinational Corporations

Read more ›
tech-texture-bg