Cyber Security Articles & News

WATCH: Computer Hacker Shares How to Keep Personal Information Safe

A man who was known as a thief to the FBI and a ghost to many corporations visited the city of Laredo to give some advice about cyber hacking.

Whether you're online through a computer or a phone, you could at any point become a target for computer hackers.  Everyday people go online to check social media and email, but little do they know hackers could be keeping track of your every move.  

Hacker, Kevin Mitnick served five years for computer crimes that people continue to fall victim to.

It only takes one employee to open a link or email that could bring down a security system.

These are all vulnerabilities Mitnick and his ghost global team expose when hired by a business but there are simple ways you can deter cyber attacks.

If you are using a 1-2-3-4 or a-b-c password, you're making yourself more vulnerable to attacks.

Mitnick is recommending you create a complex password and get a password manager program and enable two-factor identification.
Also whenever you;re logged in be wary of free WiFi.

People can be looking at what you are doing on their WiFi network and vice versa so Mitnick recommends you use a virtual private network.

Nowadays even after tacking every precaution your information could end up on an online database, so keep a close track on your finances.

Mitnick also warns against free USB. drives which could have software used by hackers to gain access to your computer.

Mitnick is also an author who has written four books on his knowledge of keeping online information safe.

His latest book, The Art of Invisibility comes out February 14th, on Valentines Day.

Video: www.kgns.tv/content/news/hacker-412927543.html

Source: KGNS News

Topics: The Art of Invisibility, VPN, computer security, complex password, keynote speaker, password manager program, information privacy, two-factor identification, virtual private network, WiFi, cyber hacking, free USB drives, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Entering the Metaverse for Your Virtual Cyber Security Events

Virtual events can utilize virtual reality (VR) and the Metaverse so you can host a memorable event that also trains your attendees in all things cybe..

Read more ›

Does Kevin Mitnick Still Hack?

Kevin Mitnick is best known for some of his earlier hacks on Motorola and other enterprise companies that earned him a spot on the FBI’s most wanted l..

Read more ›

The Most Common Social Engineering Techniques We’re Seeing This Year

With today’s available technology, threat actors have become masterminds at exploiting vulnerabilities to steal private data, and sometimes, even gain..

Read more ›
tech-texture-bg