WATCH: Professional Hacker warns of overlooked security loopholes

Kevin Mitnick calls himself the most famous hacker in the world. After serving prison time for crimes related to hacking, he now travels the country as a security consultant trying to keep individuals and companies informed of risks that could leave them open to a data breech.

Mitnick says companies have plenty of questions to ask themselves in the wake of the Equifax breech.

“Even if the hackers got in, how come the data wasn’t encrypted? That should be in the back of the mind of any security person,” Mitnick said.

On stage, Mitnick used minimal information from audience members to demonstrate how he could hack into their devices and find sensitive personal and financial information from them without much help at all. He hopes it serves as a warning for people who may not pay much attention to their personal security.

“My goal here is to make people aware of the tricks that the hackers use to get your data. They’re going to think back to what I just did in front of the entire audience and go wait a minute! Where did that really come from? Before they click, they’re going to stop look and think,” Mitnick said.

WATCH the Video (and many other informative ones) at the source herehttp://wiat.com/2017/09/14/professional-hacker-warns-of-overlooked-security-loopholes/

Source: CBS (WIAT 42)

Topics: fraud alerts, identity thefts, bluetooth speakers, Equifax, encrypted data, free credit monitoring, hackers, information theft, keynote speaker, Security Awareness, security consulting, credit reports, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›

Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read more ›

Password Management Best Practices: How Secure Are Password Managers?

Password managers are convenient tools for storing, organizing, and accessing passwords. But are they safe from cyber attacks?

Read more ›
tech-texture-bg