WATCH: Professional Hacker warns of overlooked security loopholes

Kevin Mitnick calls himself the most famous hacker in the world. After serving prison time for crimes related to hacking, he now travels the country as a security consultant trying to keep individuals and companies informed of risks that could leave them open to a data breech.

Mitnick says companies have plenty of questions to ask themselves in the wake of the Equifax breech.

“Even if the hackers got in, how come the data wasn’t encrypted? That should be in the back of the mind of any security person,” Mitnick said.

On stage, Mitnick used minimal information from audience members to demonstrate how he could hack into their devices and find sensitive personal and financial information from them without much help at all. He hopes it serves as a warning for people who may not pay much attention to their personal security.

“My goal here is to make people aware of the tricks that the hackers use to get your data. They’re going to think back to what I just did in front of the entire audience and go wait a minute! Where did that really come from? Before they click, they’re going to stop look and think,” Mitnick said.

WATCH the Video (and many other informative ones) at the source herehttp://wiat.com/2017/09/14/professional-hacker-warns-of-overlooked-security-loopholes/

Source: CBS (WIAT 42)

Topics: fraud alerts, identity thefts, bluetooth speakers, Equifax, encrypted data, free credit monitoring, hackers, information theft, keynote speaker, Security Awareness, security consulting, credit reports, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

PCI Testing: Everything You Need To Know

Penetration testing is crucial for businesses to help ensure that their security posture will stand against threat actors. For businesses that handle ..

Read more ›

The 4 Phases of Penetration Testing

So, you’ve done your research on penetration testing and are ready for the pentest engagement. But before you choose just any pentesting vendor, it’s ..

Read more ›

What is Web Application Penetration Testing?

Is your company in the process of developing a new application? There are a lot of moving parts involved in developing and deploying cutting-edge appl..

Read more ›
tech-texture-bg