12 Ways to Defeat Two-Factor Authentication
Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!
Read More >Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!
Read More >Passwords and their protection are among the most fundamental, essential aspects of enterprise data security. They also make up the bane of most users’ relationships with their enterprise devices, resources and assets. It seems no matter how stringent or lax your password policy is, the directive will be met with dissension from a significant portion of your staff. It’s frustrating for everyone — the IT department, C-suite and employees.
Read More »KnowBe4 recognized for security awareness computer-based training; positioned furthest in vision
(Ed. note: Kevin Mitnick is the Chief Hacking Officer of KnowBe4 and their flagship product is Kevin Mitnick's Security Awareness Training)
KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the Magic Quadrant for Security Awareness Computer-Based Training for the second year in a row.
Read More »Cyber security pros and the world's most famous hacker Kevin Mitnick kicked-off the Infosecurity North America Expo and Conference Opening Day Wednesday at New York's Jacob Javits Convention Center. Spearheaded by the Infosecurity Group, the global knowledge hub for the information security community, Infosecurity North America is one of the foremost events on the cybersecurity industry calendar.
Read More »Kevin Mitnick is perhaps best known as the hacker who made it onto the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations.
Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five years in a federal prison, including a year in solitary confinement.
Read More »Breaches get worse and attacks keep happening, as threat actors have all of the capability thanks to user’s habits.
Speaking at Infosecurity North America in New York City, author, speaker and chief hacking officer of KnowBe4 Kevin Mitnick said that threat actors are able to collect information on their victims all too easily, and when evaluating a company it is also straight-forward to determine suppliers, customers, partners, vendors and employees to enable a social engineering exercise.
Read More »Kevin Mitnick is perhaps best known as the hacker who made it onto the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations. Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five years in a federal prison, including a year in solitary confinement.
Read More »While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.
n 1992, Kevin Mitnick was on the run from the cops, one of the most wanted men in the United States, and certainly the most wanted hacker. He was living in Denver under a pseudonym, and was very worried about government surveillance.
Read More »The skills needed for cybersecurity jobs aren’t easy to learn in the classroom.
Between September 2017 and August 2018, employers in the United States posted 313,735 job openings for cybersecurity professionals. Filling those jobs would mean increasing the country’s current cybersecurity work force of 715,000 people by more than 40 percent, according to data presented at the National Initiative for Cybersecurity Education Conference this month. With the number of unfilled cybersecurity jobs worldwide projected to multiply into the millions in the next three years, it’s no surprise that governments, companies and schools are racing to pour more resources into cybersecurity training and education programs.
Read More »Employers and educators are rethinking the way they attract and train potential employees to meet the demands of an increasingly vulnerable online world.
“It’s scary. Our power grid, our cars, our everyday devices — basically everything is online and able to be attacked,” said Georgia Weidman, author of “Penetration Testing: A Hands-On Introduction to Hacking.” Weidman is the founder of two cybersecurity companies, Bulb Security, where she is chief executive, and Shevirah, where she is chief technology officer. Shevirah specializes in security for mobile devices.
Read More »© Copyright 2004 - 2024 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy