WATCH THIS: Kevin Mitnick reveals three things that are the most vulnerable to hacker attacks

Video: Kevin Mitnick interviewed at Business Inside Trends convention  in Poland!

What makes Internet users vulnerable to hacker attacks? "It's malware, social engineering and using the same password," said Kevin Mitnick at the Business Insider Inside Trends conference. - These are the three most important issues - he stressed.

Kevin Mitnick is considered to be the most famous hacker in the world, but for years he has been working on the side of "the good ones". Companies hire him to help protect their valuable data. During the Business Insider Inside Trends conference, Mitnick told about the beginnings of his stormy career with computers in the background - he finally spent five years in prison. 

To view this video and to read oher fascinating articles about Kevin and Business matters, please refer to the source.

Source: BUSINESS INSIDER POLSKA

Topics: Social Engineering, Speaking Engagements, Android, encrypted tunnel, Facebook hack, fake updates, Poland, cell phone tethering, data vulnerabilities, Inside Trends, iOS - end-to-end encryption, Mark Zuckerberg, password re-suse, malware, public WiFi, Signal, VPN service, cellular hotspot, data security, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg