Cyber Security Articles & News

WATCH: Professional Hacker warns of overlooked security loopholes

Kevin Mitnick calls himself the most famous hacker in the world. After serving prison time for crimes related to hacking, he now travels the country as a security consultant trying to keep individuals and companies informed of risks that could leave them open to a data breech.

Mitnick says companies have plenty of questions to ask themselves in the wake of the Equifax breech.

“Even if the hackers got in, how come the data wasn’t encrypted? That should be in the back of the mind of any security person,” Mitnick said.

On stage, Mitnick used minimal information from audience members to demonstrate how he could hack into their devices and find sensitive personal and financial information from them without much help at all. He hopes it serves as a warning for people who may not pay much attention to their personal security.

“My goal here is to make people aware of the tricks that the hackers use to get your data. They’re going to think back to what I just did in front of the entire audience and go wait a minute! Where did that really come from? Before they click, they’re going to stop look and think,” Mitnick said.

WATCH the Video (and many other informative ones) at the source herehttp://wiat.com/2017/09/14/professional-hacker-warns-of-overlooked-security-loopholes/

Source: CBS (WIAT 42)

Topics: fraud alerts, identity thefts, bluetooth speakers, Equifax, encrypted data, free credit monitoring, hackers, information theft, keynote speaker, Security Awareness, security consulting, credit reports, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration t..

Read more ›

What Is Pivoting in Cyber Security and What Does It Mean for Pentesters?

Data breaches in 2022 were abundant and sophisticated. Realistically, it’s expected that this year we will continue to see threat actors test their li..

Read more ›

What Is One-time Password (OTP) Social Engineering?

Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: ..

Read more ›
tech-texture-bg