Cyber Security Articles & News

LISTEN: Advice For May Gardening In Kansas City, And The Social Science Of Hacking

After figuring out a teacher's password with a program he created in high school, Kevin Mitnick knew hacking was his calling. But there's more to hacking than simply understanding computers, says Mitnick. It's about understanding people.

Are all those April showers making your May flowers feel a little soggy? Today, we get tips for late-spring gardening from the Kansas City Community Gardens. Also, we speak with Kevin Mitnick about how hackers can use digital know-how and social engineering to work their way into your computer. Mitnick gave up hacking after a five-year stint in prison for computer-related crimes. Now he helps companies and governments secure their own digital networks.

The Linda Hall Library hosts "The Art of Invisibility: Kevin Mitnick in Conversation with Jeff Lanza" at 7 p.m. on Thursday, May 4. The event is sold out but a stream of the event is available. Go to LindaHall.org for more information.

Kansas City Community Gardens hosts an information session and fundraiser on Saturday, June 10, at Bier Station in Kansas City, Missouri. Check KCCG.org soon for more information.

Listen to the cool radio program (begins at 22:35/48:43): kcur.org/post/advice-may-gardening-kansas-city-and-social-science-hacking#stream/0

Source: KCUR 89.3

Topics: Social Engineering, surveillance, The Art of Invisibility, VPN, AV, penetration testing, portable hot spot, spoofing, CEO fraud, encryption, cyber security, data theft, keynote speaker, NORAD, phishing attacks, Kansas City, Linda Hall Library, malware, Missouri, Mitnick Security, privacy, ransomware, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Breach and Attack Simulation vs Red Team Pentesting

Cyberattacks have posed a significant threat to organizations across the world, creating an urgency to take the necessary measures to shore up your ne..

Read more ›

What To Expect When You Get a Vulnerability Assessment From Mitnick Security

Since threat actors are constantly developing new tools and techniques for infiltrating an organization’s defenses, effective cybersecurity can never ..

Read more ›

What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration t..

Read more ›
tech-texture-bg