LISTEN: Mitnick: Does President-Elect Trump Even Have A Computer?

Monday on “The Alan Colmes Show,” Alan spoke with Mitnick Security Consulting CEO and former hacker Kevin Mitnick about whether Russian hacking was a factor in the 2016 election as well as his upcoming book The Art Of Invisibility.

Mitnick, who went to prison for hacking into forty major corporations, told Alan that if the intelligence community said there was Russian involvement, there would be little reason to doubt them. Mitnick also told Alan about how he first got into hacking back in the 1970s and how hard it will be for information about President-Elect Trump to be leaked to the internet because it doesn’t appear that the President-Elect uses a computer.

Listen to Radio Interview with Alan Holmes: https://radio.foxnews.com/2017/01/16/mitnick-does-president-elect-trump-even-have-a-computer/

Source: Fox News

Topics: Speaking Engagements, The Art of Invisibility, forensic evidence, former hacker, hacking exploits, encryption, iPhone, Password Management, phishing attacks, President Trump, protecting privacy, intelligence community, internet leaks, Mitnick Security Consulting, Russian hacking, system vulnerabilities, two-step identification, CEO, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

AI Voice Cloning: What It Is, and How to Detect Threats

Artificial Intelligence (AI) has reshaped our lives, speeding up learning, content creation, and communication. But with innovation comes a new risk: ..

Read more ›

3 Types of Hacking Seen In 2024 and Predictions For 2025

Threat actors are typically after two things from your business: data or money. Usually, they’re motivated by both, as data can help them cash in at t..

Read more ›

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›
tech-texture-bg