Cyber Security Articles & News

So do not use public wifi network

The well-known and has reformed hacker demonstrated how easy it is to steal data from users of public WiFi.

Whether it's a park, mall or airport, connected to a public Wi-Fi, a moment not feel safe in ourselves. And someone says (and demonstrate), who has long been a dark side: Kevin Mitnick, the notorious hacker who is now a recognized security expert.

Mitnick there are three simple steps to be obtained by the public WiFi users data. First of all, to create a fake wifi network (in this presentation, "Telstra Air"). If you log in to this one, you can already record keyboard keystrokes, and thus has become the user names, passwords and other personal information available.

If the hacker also sent fake updates to the machine that you installed the unsuspecting victim, you'll gain control over the computer. In addition, according to Mitnick, the hacker necessary tools to those mentioned are all there on the net, and even a school is able to use these - reports the Mail Online.

Source: Kronika

Topics: Social Engineering, Telstra Air, penetration testing, World's Most Famous Hacker, keynote speaker, Passwords, record keyboard keystrokes, security awareness training, security consultant, malware, public WiFi, simulated phishing, Spam, user names, cybercrime, cybersecurity vulnerabilities, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

4 Signs Your Organization Needs Red Team Penetration Testing

According to a recent poll conducted by PwC, executives believe that mandated disclosures, tests of resilience, and pressure to get data security and ..

Read more ›

2023 Cybersecurity Budget Considerations for Your Organization

With the use of multiple work platforms and applications, organizations must choose between spending on cybersecurity or being vulnerable to devastati..

Read more ›

Why Choose Mitnick Security for Your Penetration Testing Services?

Incorporating cybersecurity services as part of your organization’s security plan can help stop threat actors in their tracks. From cyber security awa..

Read more ›
tech-texture-bg