WATCH: Hacker Kevin Mitnick on password managers and online safety
Video
Read More >On Tuesday, by a vote of 215-205, the House of Representatives passed a bill that would undo a number of internet provisions that were put into place under the Obama administration. That same measure was passed by a vote of 50-48 in the Senate last Thursday. In the House, 212 of the 215 votes for approval came from Republicans (with 14 GOPers voting against it). In the Senate, the 50-48 vote went straight party line, with the Republicans passing it there as well.
Read More »Fox 5 went inside the mind of Kevin Mitnick, who is known as "The World's Greatest Hacker," to get his thoughts on how you can best protect yourself from cyber-attacks.
Read More »With just one wrong click, your entire digital life can be put up for ransom. One of the most famous hackers in the United States, and author of the book "The Art of Invisibility," explains how you can protect yourself against becoming the victim of malicious ransomware attacks.
Read More »(Translated from Malay using Google Translator)
Read More »While it may seem difficult these days to remain anonymous online, it's not impossible. We spoke with Kevin Mitnick, author of "The Art of Invisibility," who told us the one tool you should be using if you want to protect your identity.
Read More »Kevin Mitnick sat down with Dishin Digital producer to talk about his new book
Read More »How easy it is to hack into a cell phone and secretly turn on a camera
Read More »Most people know that computers can have malware, but did you know your cell phone is also vulnerable? Kevin Mitnick, notorious hacker and author of the book "The Art of Invisibility," explains two easy ways that someone might hack into your phone. Whether it's a jealous spouse, the CIA, or a nation state, here's how they might do it and how you can protect yourself.
Read More »The 2017 RSA Conference showcased almost 500 security companies proposing elegant solutions to solve a plethora of problems across different domains of security, including web application security, network attacks, data forensics, malware and APTs, encryption key management, risk and crisis management, and biometrics.
Read More »© Copyright 2004 - 2024 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy