Facebook Twitter LinkedIn Login Contact Us
Our Team has a 100% Success Rate!
Our Team has a 100% Success Rate!

Mitnick In The News

 

Rafa Hacker: Know More of Cybersecurity with 3 Different Books

Nov 15, 2016 - Rafa Hacker, by Rafael Nunez

Every day, you hear about security flaws, viruses, and evil hacker gangs that could leave you destitute – or, even worse, bring a whole country to its knees. However, have you ever asked to yourself what is the truth about these digital dangers? Today, we brought a list of interesting and very helpful books for you to have the best references and recommendations when talking about cybersecurity. Try to find them all, at least by the Internet, and make a little research on this topic.

Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker

This book is a true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information. Written by Kevin Mitnick.

Secrets and Lies: Digital Security in a Networked World:

This book was written by Bruce Schneier and it includes the discussion on viruses, identity theft, corporate espionage and national secrets compromised. Can anyone promise security in our digital world? The man who introduced cryptography to the boardroom says the opposite. However in this fascinating book, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product -one that system administrators and corporate executives alike must understand to survive.

Countdown to Zero Day: Kim Zetter,

An award-winning security journalist for Wired, recounts in meticulously researched and referenced detail the development, deployment and aftermath of Stuxnet, the aforementioned cyberweapon, and its successors, Flame, Duqu, and Gauss. This is not easy material, since it involves not only understanding information technology and its inner workings, but also the technical detail of centrifuges and the process of uranium enrichment.