LISTEN: Advice For May Gardening In Kansas City, And The Social Science Of Hacking

After figuring out a teacher's password with a program he created in high school, Kevin Mitnick knew hacking was his calling. But there's more to hacking than simply understanding computers, says Mitnick. It's about understanding people.

Are all those April showers making your May flowers feel a little soggy? Today, we get tips for late-spring gardening from the Kansas City Community Gardens. Also, we speak with Kevin Mitnick about how hackers can use digital know-how and social engineering to work their way into your computer. Mitnick gave up hacking after a five-year stint in prison for computer-related crimes. Now he helps companies and governments secure their own digital networks.

The Linda Hall Library hosts "The Art of Invisibility: Kevin Mitnick in Conversation with Jeff Lanza" at 7 p.m. on Thursday, May 4. The event is sold out but a stream of the event is available. Go to LindaHall.org for more information.

Kansas City Community Gardens hosts an information session and fundraiser on Saturday, June 10, at Bier Station in Kansas City, Missouri. Check KCCG.org soon for more information.

Listen to the cool radio program (begins at 22:35/48:43): kcur.org/post/advice-may-gardening-kansas-city-and-social-science-hacking#stream/0

Source: KCUR 89.3

Topics: Social Engineering, Speaking Engagements, surveillance, The Art of Invisibility, VPN, AV, penetration testing, portable hot spot, spoofing, CEO fraud, encryption, cyber security, data theft, NORAD, phishing attacks, Kansas City, Linda Hall Library, malware, Missouri, Mitnick Security, privacy, ransomware, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg