So do not use public wifi network

The well-known and has reformed hacker demonstrated how easy it is to steal data from users of public WiFi.

Whether it's a park, mall or airport, connected to a public Wi-Fi, a moment not feel safe in ourselves. And someone says (and demonstrate), who has long been a dark side: Kevin Mitnick, the notorious hacker who is now a recognized security expert.

Mitnick there are three simple steps to be obtained by the public WiFi users data. First of all, to create a fake wifi network (in this presentation, "Telstra Air"). If you log in to this one, you can already record keyboard keystrokes, and thus has become the user names, passwords and other personal information available.

If the hacker also sent fake updates to the machine that you installed the unsuspecting victim, you'll gain control over the computer. In addition, according to Mitnick, the hacker necessary tools to those mentioned are all there on the net, and even a school is able to use these - reports the Mail Online.

Source: Kronika

Topics: Social Engineering, Telstra Air, penetration testing, World's Most Famous Hacker, keynote speaker, Passwords, record keyboard keystrokes, security awareness training, security consultant, malware, public WiFi, simulated phishing, Spam, user names, cybercrime, cybersecurity vulnerabilities, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

6 FAQs From CISOs About the Pentesting Process

As a Chief Information Security Officer (CISO), you have the responsibility of not only directing your organization’s security but also conveying your..

Read more ›

What You Get When You Invest in Mitnick Red Team Pentesting

A data breach can have extremely negative impacts on businesses, including financial losses as well as harm to their reputation with clients, customer..

Read more ›

Cyber Security Penetration Testing for Multinational Corporations

Read more ›
tech-texture-bg