WATCH: Professional Hacker warns of overlooked security loopholes

Kevin Mitnick calls himself the most famous hacker in the world. After serving prison time for crimes related to hacking, he now travels the country as a security consultant trying to keep individuals and companies informed of risks that could leave them open to a data breech.

Mitnick says companies have plenty of questions to ask themselves in the wake of the Equifax breech.

“Even if the hackers got in, how come the data wasn’t encrypted? That should be in the back of the mind of any security person,” Mitnick said.

On stage, Mitnick used minimal information from audience members to demonstrate how he could hack into their devices and find sensitive personal and financial information from them without much help at all. He hopes it serves as a warning for people who may not pay much attention to their personal security.

“My goal here is to make people aware of the tricks that the hackers use to get your data. They’re going to think back to what I just did in front of the entire audience and go wait a minute! Where did that really come from? Before they click, they’re going to stop look and think,” Mitnick said.

WATCH the Video (and many other informative ones) at the source herehttp://wiat.com/2017/09/14/professional-hacker-warns-of-overlooked-security-loopholes/

Source: CBS (WIAT 42)

Topics: Speaking Engagements, fraud alerts, identity thefts, bluetooth speakers, Equifax, encrypted data, free credit monitoring, hackers, information theft, security consulting, Kevin Mitnick Security Awareness Training, credit reports, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg