Well, so do not use public wifi network

You know what they say: the well-known and has reformed hacker demonstrated how easy it is to steal data from users of public WiFi and then take control of their machines.
Whether it's a park, mall or airport, connected to a public Wi-Fi, a moment not feel safe in ourselves. And someone says (and demonstrate), who has long been a dark side: Kevin Mitnick, the notorious hacker who is now a recognized security expert.

Mitnick there are three simple steps to be obtained by the public WiFi users data. First of all, to create a fake wifi network (in this presentation, "Telstra Air"). If you log in to this one, you can already record keyboard keystrokes, and thus has become the user names, passwords and other personal information available.

If the hacker also sent fake updates to the machine that you installed the unsuspecting victim, you'll gain control over the computer. In addition, according to Mitnick, the hacker necessary tools to those mentioned are all there on the net, and even a school is able to use these - reported in the Mail Online , the assistance given to the video, which the hacker demonstrates the above.

See Video:   http://hvg.hu/tudomany/20160901_kevin_mitnick_nyilvanos_wifi_veszelyei

Source: hvg.hu

Topics: Social Engineering, fake network, penetration testing, World's Most Famous Hacker, keynote speaker, keystrokes, Passwords, phishing demonstrations, public Wi-Fi, security consultant, malware, Spam, user names, cybercrime, cybersecurity vulnerabilities, personal data, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

PCI Testing: Everything You Need To Know

Penetration testing is crucial for businesses to help ensure that their security posture will stand against threat actors. For businesses that handle ..

Read more ›

The 4 Phases of Penetration Testing

So, you’ve done your research on penetration testing and are ready for the pentest engagement. But before you choose just any pentesting vendor, it’s ..

Read more ›

What is Web Application Penetration Testing?

Is your company in the process of developing a new application? There are a lot of moving parts involved in developing and deploying cutting-edge appl..

Read more ›
tech-texture-bg