NEW CARTOON: How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992

While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.

n 1992, Kevin Mitnick was on the run from the cops, one of the most wanted men in the United States, and certainly the most wanted hacker. He was living in Denver under a pseudonym, and was very worried about government surveillance.

Read More >
Social Engineering - From the Trojan Horse to Firewalls

Social Engineering is, without a doubt, the oldest computer hack. A loose term defining a range of hacks and scams, social engineering has persisted through countless centuries of human history. Simple in premise, difficult to defend against, and constantly evolving, social engineering represents one of the single greatest threats to information security in the history of technology.

It’s easy to forget that even the most secure firewall combined with the latest and greatest security software is still operated by a human being behind the keyboard. That extra-tight security is only as secure as the person operating the machine. This often presents the easiest method of entry into a secure system, as human beings are much easier to trick than machines.

Read More »
Infosecurity Mexico 2018 will be held in May and invites the most famous hacker in the world

The organizers of Infosecurity Mexico 2018 announced their next edition , to be held on May 23 and 24 at Centro Banamex.

Read More »
SEE LIVE: PECB Insights Conference in Montreal, Canada on the 29th – 30th of June, 2017

The first edition of the PECB Insights Conference will be hosted at the “Palais des congrès de Montréal”, in Montreal, Canada, from the 29th to the 30th of June, 2017. With a variety of stimulating and interactive sessions, this edition begins with some interesting Pre-Conference Training courses, exclusively revealed on the 27th and 28th of June, 2017.

Read More »
Wired Is the Latest Publication to Provide a Secure Space for Sources Bearing Information

Wired signs on to SecureDrop

While Wired is the latest in a still-expanding group of publications offering sources a secure, anonymous space to send information through SecureDrop, there’s something a little different about Wired signing on.

Read More »
Hacker Shows and Tells Health Care CIOs Why Security is Important

Kevin Mitnick, famous former hacker, gives thought provoking demonstration to open CHIME-HIMSS CIO Forum

Read More »
Hacker Kevin Mitnick on the risks of human components for well being information safety

Legendary hacker Kevin Mitnick, who spent practically three years as a fugitive from the FBI earlier than being arrested in 1995, had some helpful recommendation for the healthcare chief data officers on the CHIME-HIMSS CIO Discussion board on Sunday.

Read More »
SEE LIVE: Western Canada Information Security Conference May 16, 2017

ISACA® Winnipeg Chapter is proud to announce the 2017 Western Canada Information Security Conference (WCISC), the only Information Security and Control Conference in Manitoba!

Read More »
SEE LIVE: Hear from a Hacker at HostingCon Global: Kevin Mitnick to Keynote Annual Conference

Once wanted by the FBI, Mitnick now speaks about security and social engineering

Read More »
Kevin Mitnick to Present Keynote at Data Center World and HostingCon Events

Data Center World, the global conference for data center, facilities and IT professionals, and HostingCon, the global event for the cloud and service provider ecosystem, today officially announced Kevin Mitnick, will keynote both events, which will take place in Los Angeles, CA at the Los Angeles Convention Center April 3-6, 2017.  Mitnick's address will shed light on ways companies can protect themselves from malicious hacking attempts.

Read More »