The most famous hacker in the world will come to Poland to learn about manipulating people
Kevin Mitnick in the world of hacking is what Michael Schumacher is in the world of F1. Already in October, this reformed cybercriminal will come to Warsaw to teach participants of the Business Insider INSIDE TRENDS conference, among others about the protection of their data on the Internet and technologies of psychological manipulation.
Today’s millennial is born into technology and see it as a requirement and not a luxury. Smartphone has become integral to our existence—our personal secret keeper—safe-keeping significant amount of personal and professional information such as our personal to the moment data and photos, bank details, emails, passwords etc. In the wake of several privacy and information breach incidents, the big question glaring at us all is – “are our secrets really a secret anymore?” One is probably monitored by half a dozen companies from the moment they open their eyes in the morning until they go to sleep; and if you own a sleep tracker, then probably while you sleep too! A seemingly innocuous message could be all that is needed to compromise your privacy – by say, accessing microphone, call logs, locations, bank details and everything that is yours! Here’s how:
While smartphones are the epitome of modern convenience, these devices which store our personal and professional information like emails, photos, bank details etc. can easily fall prey to hackers and to other malicious activities. With the recent series of data breaches across businesses globally, the concern regarding protecting user data has become more relevant than before. There are many applications in your smartphones that access your private data by taking permissions through pop-ups or otherwise. You would notice apps like third-party applications, flashlights, etc. asking permissions to access your gallery, messages, calls, which they don’t need. Allowing these third-party applications access to your smartphone's data puts your information at risk. Hardip Singh, Executive Director, Optiemus Infracom, feels that the dirty little secret that these ubiquitous devices, which we have with us 24X7, and keep switched on for most of the time, is also a serious threat to our privacy. An innocent looking message could be all that is needed to compromise on your privacy — accessing your microphone, your call logs, your locations, your bank details and everything that is very personal to you. Here’s why:
Cybersecurity books arm readers in the war against hackers
The Editors at Cybersecurity Ventures read “The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age” by Adam Segal last year and featured it here. The groundbreaking book about cyberwarfare is as relevant today and when it was published — and recommended summer reading for anyone who hasn’t gotten to it yet.
LISTEN: Advice For May Gardening In Kansas City, And The Social Science Of Hacking
After figuring out a teacher's password with a program he created in high school, Kevin Mitnick knew hacking was his calling. But there's more to hacking than simply understanding computers, says Mitnick. It's about understanding people.