LISTEN: Ep. 024: Cybersecurity and Hacking with Kevin Mitnick

In his latest book, “The Art of Invisibility,” Kevin uses true-life stories to show exactly what is happening without your knowledge, teaching you online

and real-world tactics to protect you and your family.

It seems there’s a story every day in the news that involves hacking. Whether it’s a big box retailer, the IRS, or the Democratic National Committee, cyber warfare has become one of the biggest threats in the 21st century, and we are all vulnerable.

To help you understand the current environment and to learn some of the simple steps we should take to prevent ourselves from becoming a victim, we had to find an expert—a professional hacker. I’m not talking about some random hack; I’m talking about the hacker of all hackers, Kevin Mitnick.

This guy is the real deal. So real, in fact, that after a well-publicized pursuit back in the 1990s, he was arrested by the FBI and spent five years in prison, including eight months in solitary confinement.

Now a free man, Kevin does consulting work for Fortune 500 companies and the government. I should point out that, for business cards, he uses metal lock pick sets with his name and number on them. Really.

In his latest book, “The Art of Invisibility,” Kevin uses true-life stories to show exactly what is happening without your knowledge, teaching you online and real-world tactics to protect you and your family. After reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.

Despite what we’d all like to believe, our passwords really can be stolen, our data sold and our personal emails read. After listening to this interview, check out the book, and learn the simple steps to help prevent it from happening to you.

A big-time presence in the social media world, you call follow Kevin on Twitter for updates and tips on cyber security.

Listen to the podcast here.

Source: Betterment

Topics: Social Engineering, Speaking Engagements, The Art of Invisibility, cyber security, cyber warfare, data theft, hackers, Password Management, privacy protection, malware, Wi-Fi, anonymity, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›

Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read more ›
tech-texture-bg