WATCH: Confessions of a former hacker: 5 techniques to make you more secure online

Consumers are daily targets of email and phone scams, not to mention the frequent cyberattacks on big data. So it’s never been more important to safelock your online security as best as you can.

“The scams are changing everyday and consumers aren’t knowledgeable about the new scams that are going to be used against them,” says Kevin Mitnick, top cybersecurity expert and author of “The Art of Invisibility: The World’s Most Famous Hacker Teaches You How To Be Safe In The Age Of Big Brother And Big Data.”

Formerly on the US government’s “Most Wanted” list in the 1990s for hacking into cellphone companies, Mitnick served five years in prison for computer fraud. Since his release in 2000, he’s built a career as a “white hat” hacker, working as a security consultant for companies around the world. In this new video series,“Confessions…”  Yahoo Finance interviews Mitnick to find out what security measures he takes to safeguard his own personal information online.

Watch the Video and join the conversation: https://ca.finance.yahoo.com/news/confessions-former-hacker-5-techniques-make-secure-online-144026427.html

Source: YAHOO Finance

Topics: Speaking Engagements, The Art of Invisibility, VPN, cybersecurity expert, Dashlane, dedicated device, HTTPS, LastPass, iPad Pro, virtual private network, cyberattacks, bank alerts, password manager, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

AI Voice Cloning: What It Is, and How to Detect Threats

Artificial Intelligence (AI) has reshaped our lives, speeding up learning, content creation, and communication. But with innovation comes a new risk: ..

Read more ›

3 Types of Hacking Seen In 2024 and Predictions For 2025

Threat actors are typically after two things from your business: data or money. Usually, they’re motivated by both, as data can help them cash in at t..

Read more ›

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›
tech-texture-bg