EVENT REVIEW: Staff are “Backdoor to Hackers” warns Former FBI Most-Wanted
Kevin Mitnick was arrested in 1995 and spent nearly five years in prison for various computer and communications-related crimes
Read More >Kevin Mitnick was arrested in 1995 and spent nearly five years in prison for various computer and communications-related crimes
Read More >Kevin Mitnick, who was jailed in the 1990s, spoke at IP EXPO in Manchester - and shared a few tricks from the dark trade
Read More »Experience a snapshot of IP EXPO Manchester Day 1! Featuring Kevin Mitnick, James Akrigg and Amy Nicholson from Microsoft and many more! Make sure you join us on Day tour for Day tour, featuring AWS and IBM Watson
Read More »From the horrible Hollywood hacks of 2014 to John Podesta's emails, hackers aren't feverishly trying to sneak into your computer. They're coming up with better ways to convince you to let them in. So Sarah Jeong invited a hacker in to see exactly how it's done.
Read More »Qualys Presentation at RSA Conference 2017
Read More »Most of us are aware that there are people trying to steal our personal information and identities, but are we aware of the easiest ways for these people to get it? No.
Read More »You know what I’m thankful for? Target. Where else are you going to find a 6 shelf, 80 inch bookcase for $35? Sure, it’s made of cheap wood and sways I bit if I bump into it, but hell… I gotta display my excessive collection of books some how. If I’m going to spend a ridiculous sum of money on acquiring and preserving a handwritten civil war memoir, I want people to appreciate it.
Read More »And what to do to stop being so used by cybercriminals
Read More »I was fortunate enough to meet the author, Kevin Mitnick, while attending RSA in February. I was given a signed copy of The Art of Invisibility, one of The State Security’s must-reads for infosec pros, so I made it a point to read the book.
Read More »When a credit bureau hired Kevin Mitnick’s company to test its security defenses, he went straight for the crown jewels. He decided he would try to get inside the bureau’s data center, physically, on his own two feet.
Read More »© Copyright 2004 - 2025 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy