WATCH: How to Be Safe in the Age of Big Brother and Big Data | Kevin Mitnick

Qualys Presentation at RSA Conference 2017

Kevin Mitnick, the world's most famous hacker, has been the subject of countless profiles published and aired throughout the world. His leading penetration-testing team is highly respected and sought-after for its security services by the world's top corporations and governments. The company he founded, Mitnick Security Consulting LLC, has clients that include dozens of Fortune 500 companies and many world governments. Mitnick is the bestselling author of Ghost in the Wires, The Art of Intrusion, and The Art of Deception. He lives in Las Vegas.

The Art of Invisibility is a very timely title, especially given the many recent news items featuring Big Brother, Big Data, and hacking groups like WikiLeaks. This unique book explains not only just how vulnerable your information is online but how that same information can be used against you in unexpected ways—and, even more important, how you can protect yourself and your family. Despite what we’d all like to believe, your password really can be cracked, your data really will be sold, and someone really could be reading your email.

Source: YouTube

Topics: Social Engineering, Speaking Engagements, The Art of Invisibility, eavesdropping device, Edward Snowden, government surveillance, identity theft, penetration testing, RSA Conference, Two-Factor Authentication, encryption, McDonald's speaker hack, privacy breach, PSTN, information brokers, right to privacy, Signal, WiFi, Data Breach, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

AI Voice Cloning: What It Is, and How to Detect Threats

Artificial Intelligence (AI) has reshaped our lives, speeding up learning, content creation, and communication. But with innovation comes a new risk: ..

Read more ›

3 Types of Hacking Seen In 2024 and Predictions For 2025

Threat actors are typically after two things from your business: data or money. Usually, they’re motivated by both, as data can help them cash in at t..

Read more ›

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›
tech-texture-bg