EVENT REVIEW: Eye Opening and Terrifying: How Easy it is to Hack Technology

I recently had the pleasure of attending a conference where Kevin Mitnick, the “world’s most famous hacker,” presented.    Kevin is a bestselling author, and top cyber security speaker who hacked into 40 major corporations simply for the challenge of doing so!

Kevin began his hacking career as a young teen in the 1980s.  He was a prankster who was incredibly intelligent, and what kid doesn’t enjoy having a little fun hacking into the major phone systems?    He eventually moved on to bigger hacks, leading to his arrest and prison time served.

Although Kevin never intended to profit from his hacking hobby, he had more curiosity and intelligence than evil intentions, there are people all over the world who do!   I am fully aware that as long as we are in a cyber world, we are all at the mercy of the next big cyber threat… the next genius who does have bad intentions… but what I was not aware of is HOW EASY AND QUICK it is to gain access to your computer!

During the hour-long presentation, Kevin performed three cyber attacks, each only taking a few moments and to gain access to a user’s computer, including usernames and passwords and breaking through two-factor authentication protection.    One of the tricks he demonstrated was duplicating an electronic access key simply by walking past a person who was carrying the key.  How many times do we walked past someone with a laptop bag and think absolutely nothing of it?  I know now that bag may contain a device that will duplicate my access key.

Watching this happen in real life was an eye-opening experience.  It made me want to close all of my online accounts, delete all social media tools, and revert to the cyber-safe dark ages.   Of course, that isn’t realistic, but it does make one realize the importance of cyber security even as an individual.

This cool review and other great articles can be found at source.

Source: Accent Consulting

Topics: Two-Factor Authentication, cyber security expert, Hacker, keynote speaker, privacy protection, access key duplication, cyber attacks, cyber threat, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Redefining Your Enterprise’s Cyber Security Posture During Mergers & Acquisitions

With 3,205 data compromises occurring in 2023 alone, fortifying your enterprise’s cybersecurity posture is more important than ever.

Read more ›

Choosing a Penetration Testing Company for Mac-based Environments

Powering your business with Apple devices because of their reputable security and privacy features? You may be surprised to learn that while Apple dev..

Read more ›

AI in Cyber Security: Impacts, Benefits, and More To Be Aware Of

Artificial intelligence in cybersecurity has been a hot topic lately, especially with the rise of OpenAI’s ChatGPT. But does that mean it would make a..

Read more ›
tech-texture-bg