WATCH: Confessions of a former hacker: 5 techniques to make you more secure online

Consumers are daily targets of email and phone scams, not to mention the frequent cyberattacks on big data. So it’s never been more important to safelock your online security as best as you can.

“The scams are changing everyday and consumers aren’t knowledgeable about the new scams that are going to be used against them,” says Kevin Mitnick, top cybersecurity expert and author of “The Art of Invisibility: The World’s Most Famous Hacker Teaches You How To Be Safe In The Age Of Big Brother And Big Data.”

Formerly on the US government’s “Most Wanted” list in the 1990s for hacking into cellphone companies, Mitnick served five years in prison for computer fraud. Since his release in 2000, he’s built a career as a “white hat” hacker, working as a security consultant for companies around the world. In this new video series,“Confessions…”  Yahoo Finance interviews Mitnick to find out what security measures he takes to safeguard his own personal information online.

Watch the Video and join the conversation: https://ca.finance.yahoo.com/news/confessions-former-hacker-5-techniques-make-secure-online-144026427.html

Source: YAHOO Finance

Topics: Speaking Engagements, The Art of Invisibility, VPN, cybersecurity expert, Dashlane, dedicated device, HTTPS, LastPass, iPad Pro, virtual private network, cyberattacks, bank alerts, password manager, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg