LISTEN: Advice For May Gardening In Kansas City, And The Social Science Of Hacking

After figuring out a teacher's password with a program he created in high school, Kevin Mitnick knew hacking was his calling. But there's more to hacking than simply understanding computers, says Mitnick. It's about understanding people.

Are all those April showers making your May flowers feel a little soggy? Today, we get tips for late-spring gardening from the Kansas City Community Gardens. Also, we speak with Kevin Mitnick about how hackers can use digital know-how and social engineering to work their way into your computer. Mitnick gave up hacking after a five-year stint in prison for computer-related crimes. Now he helps companies and governments secure their own digital networks.

The Linda Hall Library hosts "The Art of Invisibility: Kevin Mitnick in Conversation with Jeff Lanza" at 7 p.m. on Thursday, May 4. The event is sold out but a stream of the event is available. Go to LindaHall.org for more information.

Kansas City Community Gardens hosts an information session and fundraiser on Saturday, June 10, at Bier Station in Kansas City, Missouri. Check KCCG.org soon for more information.

Listen to the cool radio program (begins at 22:35/48:43): kcur.org/post/advice-may-gardening-kansas-city-and-social-science-hacking#stream/0

Source: KCUR 89.3

Topics: Social Engineering, surveillance, The Art of Invisibility, VPN, AV, penetration testing, portable hot spot, spoofing, CEO fraud, encryption, cyber security, data theft, keynote speaker, NORAD, phishing attacks, Kansas City, Linda Hall Library, malware, Missouri, Mitnick Security, privacy, ransomware, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Redefining Your Enterprise’s Cyber Security Posture During Mergers & Acquisitions

With 3,205 data compromises occurring in 2023 alone, fortifying your enterprise’s cybersecurity posture is more important than ever.

Read more ›

Choosing a Penetration Testing Company for Mac-based Environments

Powering your business with Apple devices because of their reputable security and privacy features? You may be surprised to learn that while Apple dev..

Read more ›

AI in Cyber Security: Impacts, Benefits, and More To Be Aware Of

Artificial intelligence in cybersecurity has been a hot topic lately, especially with the rise of OpenAI’s ChatGPT. But does that mean it would make a..

Read more ›
tech-texture-bg