BEST BOOK OF THE MONTH!!! Amazon Books: The Art of Invisibility: The World’s Most Famous Hacker Teaches you How to be Safe in the Age of Big Brother
Announcement on Kevin's twitter here.
Read More >Announcement on Kevin's twitter here.
Read More >This week I’ve been reading Kevin Mitnick’s classic book “Ghost in the Wires” on the recommendation of our Senior Director of IT. The book itself is an awesome read, though it’s fair to say the memoirs of Kevin’s social engineering attacks are chilling for anyone tasked with safeguarding patient data.
Read More »t’s easy to assume your company will be safe with security systems in place but this view just won’t cut it against the latest breed of hackers.
Read More »Company announces game-changing strategic alliance with The Security Awareness Co; Launches ModStore to offer
Read More »With law firms notably one of the largest targets for cyber security attacks, a former hacker turned security expert has revealed how smaller players, including SME law firms, can properly protect themselves from inevitable threats.
Read More »New functionality offered at no-charge to fight rising threats of phishing and ransomware and shore up the “weakest link in security: users
Read More »I’m an early adopter. Have you ever used Ello or the now defunct UrbanSpoon? I was there from the get-go on both of those. When it comes to anything technology related I like getting on board first. While this can be expensive, it does make for interesting conversations around the home office. Especially when one of these technologies fizzled out, remember MySpace.
Read More »Once the world’s most wanted criminal hacker now computer security consultant Kevin Mitnick breakdown how Russia hacked into the US. Election.
Read More »Here are some tips from the ATO to help business owners maintain the most digitally secure business they possibly can.
Read More »A ransomware attack on the Howard County government last month affected more files than officials first realized and has led to an all-out effort to fight the encryption malware.
Read More »© Copyright 2004 - 2024 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy