Cyber Security Articles & News

WATCH: Kevin Mitnick’s Art of Invisibility Book Review by Cybersecurity Expert

Video:  CyberSecurity Expert, Scott Schober, reviews Kevin Mitnick's latest book entitled The Art of Invisibility

Scott Schober is a #cybersecurity and wireless technology expert, author of Hacked Again, host of 2 Minute CyberSecurity Briefing video podcast and CEO of Berkeley Varitronics Systems who appears regularly on Bloomberg TV, Fox Business & Fox News, CCTV America, Canadian TV News, Al Jazeera America, Arise TV as well as CNN, CBS Morning Show, MSNBC, CNBC, The Blaze, WPIX as well as local and syndicated Radio including Sirius/XM & Bloomberg Radio and NPR.

Read More >
BOOK REVIEW: Cybersecurity Classic The Art of Deception

Cybersecurity Classic The Art of Deception

The Art of Deception is a brilliant cybersecurity book written by legendary hacker Kevin Mitnick. In stunning detail, he shares how social engineering works — how he and other hackers con people into giving up passwords, account numbers, and social security numbers. Deception is how hackers acquire the keys to the kingdom. Published in 2002, it remains a cybersecurity classic. The primary point of his book? In cybersecurity, we, humans, are the weakest link.

Read More »
Beware! Your Smartphone is Watching You

Today’s millennial is born into technology and see it as a requirement and not a luxury. Smartphone has become integral to our existence—our personal secret keeper—safe-keeping significant amount of personal and professional information such as our personal to the moment data and photos, bank details, emails, passwords etc. In the wake of several privacy and information breach incidents, the big question glaring at us all is – “are our secrets really a secret anymore?” One is probably monitored by half a dozen companies from the moment they open their eyes in the morning until they go to sleep; and if you own a sleep tracker, then probably while you sleep too! A seemingly innocuous message could be all that is needed to compromise your privacy – by say, accessing microphone, call logs, locations, bank details and everything that is yours! Here’s how:

Read More »
KnowBe4 Secures Number Two Spot on Cybersecurity 500

KnowBe4 moves up the Cybersecurity 500 list from number six to number two of the world’s hottest security companies in 2018

The Cybersecurity 500 list of the world’s hottest security companies was officially released May 15, 2018 announcing KnowBe4’s placement at number two. Global spending on security awareness training for employees is predicted to reach $10 billion by 2027, putting KnowBe4 in the spotlight. 

Read More »
Musk: Thousands Of Supercharger Stations Under Construction

Tesla has thousands of Supercharger “locations” under construction or awaiting construction permits, Elon Musk said in a tweet responding to Kevin Mitnick’s question about Supercharger stations in California.

Read More »
WATCH: Well, that was easy: Two-factor authentication hack feeds on phony e-mail

Two-factor authentication can be beat, as a hacker demo has shown. Lots of attention is being paid to a video posted where Kevin Mitnick, KnownBe4 chief hacking officer, revealed the two-factor exploit.

Read More »
WATCH: This hacker shows how to beat two-factor authentication

A security researcher, Chief Hacking Officer of company KnowBe4 Kevin Mitnick has developed a social engineering attack to breach two-factor authentication, TechCrunch reported.

Read More »
WATCH: This Tool Can Hack Your Accounts Even with Two-Factor Authentication

The internet is a dangerous place, replete with shady people looking to steal your personal information. Enabling two-factor authentication (sometimes called two-factor verification) is one of the best way to keep your online accounts secure. However, famed hacker Kevin Mitnick shows how even this security measure can’t completely protect your data if you don’t remain constantly vigilant.

Read More »
Phishing Attack Bypasses Two-Factor Authentication

Hacker Kevin Mitnick demonstrates a phishing attack designed to abuse multi-factor authentication and take over targets' accounts.

Businesses and consumers around the world are encouraged to adopt two-factor authentication as a means of strengthening login security. But 2FA isn't ironclad: attackers are finding ways to circumvent the common best practice. In this case, they use social engineering.

Read More »
Hacker Kevin Mitnick shows how to bypass 2FA

A new exploit allows hackers to spoof two-factor authentication requests by sending a user to a fake login page and then stealing the username, password, and session cookie.

Read More »