Cyber Security Articles & News

So do not use public wifi network

The well-known and has reformed hacker demonstrated how easy it is to steal data from users of public WiFi.

Whether it's a park, mall or airport, connected to a public Wi-Fi, a moment not feel safe in ourselves. And someone says (and demonstrate), who has long been a dark side: Kevin Mitnick, the notorious hacker who is now a recognized security expert.

Mitnick there are three simple steps to be obtained by the public WiFi users data. First of all, to create a fake wifi network (in this presentation, "Telstra Air"). If you log in to this one, you can already record keyboard keystrokes, and thus has become the user names, passwords and other personal information available.

If the hacker also sent fake updates to the machine that you installed the unsuspecting victim, you'll gain control over the computer. In addition, according to Mitnick, the hacker necessary tools to those mentioned are all there on the net, and even a school is able to use these - reports the Mail Online.

Source: Kronika

Topics: Social Engineering, Telstra Air, penetration testing, World's Most Famous Hacker, keynote speaker, Passwords, record keyboard keystrokes, security awareness training, security consultant, malware, public WiFi, simulated phishing, Spam, user names, cybercrime, cybersecurity vulnerabilities, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

How Social Engineering Can Affect an Organization

Organizations around the world are enrolled in security awareness training programs and taught to look out for cybercriminals who are using a hacking ..

Read more ›

5 Questions to Ask Before Conducting a Pentest

Getting ready for a pentest might seem overwhelming, no matter if it’s your first or your fourth. 

Read more ›

Who is REvil? The Notorious Ransomware Hacking Group, Explained

Over the last two years, the internet has been riddled with ransomware attacks wherein cybercriminals compromise technology or data, make it inaccessi..

Read more ›
tech-texture-bg