BOOK REVIEW: Cybersecurity Classic The Art of Deception

Cybersecurity Classic The Art of Deception

The Art of Deception is a brilliant cybersecurity book written by legendary hacker Kevin Mitnick. In stunning detail, he shares how social engineering works — how he and other hackers con people into giving up passwords, account numbers, and social security numbers. Deception is how hackers acquire the keys to the kingdom. Published in 2002, it remains a cybersecurity classic. The primary point of his book? In cybersecurity, we, humans, are the weakest link.

As executive search firm that recruits top technology executives in cybersecurity, we are a nerdy practice. That is why we recommend the hit television series Mr. Robot, a psychological thriller that follows a young programmer who works as a cyber-security engineer by day and a vigilante hacker by night. The series has made hackers human.

World’s Most Famous Hacker

Kevin Mitnick is considered by many in cybersecurity to be the world’s most famous hacker. At one point, he made the FBI’s “Most Wanted” list because he hacked into 40 major corporations. He didn’t do it for anything but the sport of it. Because it was there. To see if he could. The FBI saw it differently. Mitnick was arrested in 1995 and spend five years in prison for various computer and communications-related crimes. Mitnick was convicted of copying software unlawfully. However, Mitnick supporters found the punishment excessive, claiming many of the cybersecurity charges against him were trumped-up and not based on actual losses.

For full review and other great information refer to the source.

Source: The Good Search

Topics: Social Engineering, Speaking Engagements, technology, The Art of Deception, weakest security link, security weaknesses, cyber security, FBI, Kevin M9itnick, Password Management, Mitnick Security Consulting

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Understanding Red Teaming vs. Pentesting

Online breaches are costing businesses big. With the worldwide cost of cyber attacks expected to reach $10.5 trillion in 2025, cybersecurity testing h..

Read more ›

The Main Types of Ransomware & How to Detect an Attack

Ransomware Attacks: A Growing Threat to Businesses

Read more ›

Understanding the Main Types of Penetration Testing

Penetration testing, (aka pentesting), is the backbone of modern cybersecurity. But for security leaders, it often raises more questions than answers,..

Read more ›
tech-texture-bg