Cyber Security Articles & News

WATCH: Confessions of a former hacker: 5 techniques to make you more secure online

Consumers are daily targets of email and phone scams, not to mention the frequent cyberattacks on big data. So it’s never been more important to safelock your online security as best as you can.

“The scams are changing everyday and consumers aren’t knowledgeable about the new scams that are going to be used against them,” says Kevin Mitnick, top cybersecurity expert and author of “The Art of Invisibility: The World’s Most Famous Hacker Teaches You How To Be Safe In The Age Of Big Brother And Big Data.”

Formerly on the US government’s “Most Wanted” list in the 1990s for hacking into cellphone companies, Mitnick served five years in prison for computer fraud. Since his release in 2000, he’s built a career as a “white hat” hacker, working as a security consultant for companies around the world. In this new video series,“Confessions…”  Yahoo Finance interviews Mitnick to find out what security measures he takes to safeguard his own personal information online.

Watch the Video and join the conversation: https://ca.finance.yahoo.com/news/confessions-former-hacker-5-techniques-make-secure-online-144026427.html

Source: YAHOO Finance

Topics: The Art of Invisibility, VPN, World's Most Famous Hacker, cybersecurity expert, Dashlane, dedicated device, HTTPS, keynote speaker, LastPass, iPad Pro, virtual private network, cyberattacks, bank alerts, password manager, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration t..

Read more ›

What Is Pivoting in Cyber Security and What Does It Mean for Pentesters?

Data breaches in 2022 were abundant and sophisticated. Realistically, it’s expected that this year we will continue to see threat actors test their li..

Read more ›

What Is One-time Password (OTP) Social Engineering?

Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: ..

Read more ›
tech-texture-bg