Social engineering threatens IoT security issues
While the threat of IoT security issues is apparent, people and the processes they create are often more problematic.
Read More >While the threat of IoT security issues is apparent, people and the processes they create are often more problematic.
Read More >It's very difficult to come up with and remember unique passwords for every single login. Cyber security expert Kevin Mitnick — author of the book "The Art of Invisibility" — explains why you shouldn't even try to come up with your own passwords, and what you should do instead.
Read More »In his latest book, “The Art of Invisibility,” Kevin uses true-life stories to show exactly what is happening without your knowledge, teaching you online
Read More »Every year, thousands of IT pros and tech marketers descend upon Austin, Texas to talk about tech at our IT conference, SpiceWorld (where everything IT connects!). And if you attend, you'll experience not only awesome parties and networking with your peers over a beer or three, you'll also have the opportunity to see great presentations put on by IT professionals in the know.
Read More »The Cybersecurity 500 / Q2 2017 list of the world’s hottest security companies was officially released June 21, 2017.
Read More »While attending the RSA show in February, I met Kevin (@KevinMitnick) and obtained a copy of The Art of Invisibility, which I immediately read. Due to the great many references to Kevin’s past, I thought it would be informative and worthwhile to read Ghost in the Wires. It’s also listed on the Tripwire 10 must-read books for information security professionals.
Read More »If you want to meet a really smart hacker, talk to a cybersecurity defender. These talented professionals are working every day to make cybercrime harder and less lucrative.
Read More »Video: Kevin Mitnick at the New York Stock Exchange
Read More »VIDEO:
Read More »Many years ago, one of the world’s most popular hacker Kevin Mitnick explained in his book “The Art of Deception” the power of social engineering techniques, today we are aware that social engineering can be combined with hacking to power insidious attacks.
Read More »© Copyright 2004 - 2024 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy