SEE LIVE: Cyber Incursion – Protecting Your Assets

Kevin Mitnick is perhaps best known as the hacker who made it onto the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations. Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five years in a federal prison, including a year in solitary confinement.

Read More >
Kevin Mitnick, CEO, Mitnick Security

Preceded by reputation

Kevin Mitnick is perhaps best known as the hacker who made it to the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations. Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five years in a federal prison, including a year in solitary confinement.

Read More »
SEE LIVE (Poland): The famous hacker advises how to protect data from attacks using “social engineering”

A dozen or so years ago, "data protection" or "cybersecurity" were concepts close to mainly state and international companies and institutions - the average internet user did not care much about them. Today, when we have everything on the smartphone - information about family, health or banking data - protecting these resources is a challenge for everyone. Often, however, we focus too much on technology, and too little on ... our own behavior - as the most famous hacker in history Kevin Mitnick convinces, currently a security consultant who will be a guest of the Inside Trends conference organized by BI Polska.

Read More »
Keynote Speaker Kevin Mitnick - The World’s Most Famous Hacker

Kevin is the world's most famous hacker, bestselling author, and the top cyber security speaker. Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.

Read More »
Business Insider Inside Trends conference in Warsaw

The event was announced on October 18 and 19 this year. in Warsaw in the Praga Center Koneser is the first edition of the Inside Trends conference organized by Business Insider Polska.

Read More »
BOOK REVIEW: Cybersecurity Classic The Art of Deception

Cybersecurity Classic The Art of Deception

The Art of Deception is a brilliant cybersecurity book written by legendary hacker Kevin Mitnick. In stunning detail, he shares how social engineering works — how he and other hackers con people into giving up passwords, account numbers, and social security numbers. Deception is how hackers acquire the keys to the kingdom. Published in 2002, it remains a cybersecurity classic. The primary point of his book? In cybersecurity, we, humans, are the weakest link.

Read More »
Women in Information Security: Valerie Thomas

In my last interview, I spoke with Jen Fox. She’s a Senior Security Consultant who specializes in compliance.

Read More »
Trust nothing, question everything: Social engineering and the insider threat

Social engineering (in the context of information security): The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

Read More »
Social engineering threatens IoT security issues

While the threat of  IoT security issues is apparent, people and the processes they create are often more problematic.

Read More »
The Most Common Social Engineering Attacks

Many years ago, one of the world’s most popular hacker Kevin Mitnick explained in his book “The Art of Deception” the power of social engineering techniques, today we are aware that social engineering can be combined with hacking to power insidious attacks.

Read More »