Cyber Security Articles & News

WATCH: How to Be Safe in the Age of Big Brother and Big Data | Kevin Mitnick

Qualys Presentation at RSA Conference 2017

Kevin Mitnick, the world's most famous hacker, has been the subject of countless profiles published and aired throughout the world. His leading penetration-testing team is highly respected and sought-after for its security services by the world's top corporations and governments. The company he founded, Mitnick Security Consulting LLC, has clients that include dozens of Fortune 500 companies and many world governments. Mitnick is the bestselling author of Ghost in the Wires, The Art of Intrusion, and The Art of Deception. He lives in Las Vegas.

The Art of Invisibility is a very timely title, especially given the many recent news items featuring Big Brother, Big Data, and hacking groups like WikiLeaks. This unique book explains not only just how vulnerable your information is online but how that same information can be used against you in unexpected ways—and, even more important, how you can protect yourself and your family. Despite what we’d all like to believe, your password really can be cracked, your data really will be sold, and someone really could be reading your email.

Source: YouTube

Topics: Social Engineering, The Art of Invisibility, eavesdropping device, Edward Snowden, government surveillance, identity theft, penetration testing, RSA Conference, Two-Factor Authentication, encryption, data privacy, keynote speaker, McDonald's speaker hack, privacy breach, PSTN, information brokers, right to privacy, Signal, WiFi, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What is a Penetration Testing Framework?

Penetration testing services are performed by cybersecurity companies to help find weaknesses in an organization's network, internal systems, and show..

Read more ›

What To Expect During Red Team Operations

Companies are producing an exponential amount of data every day and by 2025, it’s estimated that there will be about 181 zettabytes of data. As your o..

Read more ›

4 Considerations When Choosing Between Pentesting Companies

As business models continue to evolve the need for cybersecurity measures is more necessary than ever before.

Read more ›