blog-slider.jpg

KnowBe4

Security Awareness Training Blog


Keeping You Informed. Keeping You Aware.

New Book Coming Soon from Kevin Mitnick for You

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Kevin Mitnick, the world's most famous hacker, and KnowBe4's Chief Hacking Officer teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.

Why does Kevin Mitnick recommend 20-character passwords?

The background is based on current state-of-the-art password cracking technology.

In short, hackers penetrate the network, get access to a domain controller and pull the file with all user names and passwords out.

IT'S SHOWTIME! Kevin Mitnick Episode on NATIONAL GEOGRAPHIC - THIS SUNDAY

National Geographic has done a special on Kevin Mitnick and it plays this Sunday!

KnowBe4 and Kevin Mitnick Featured in USA Today Cybersecurity Supplement

We recently participated in USA Today's “Cyber Security” campaign that aims to encourage readers to recognize the importance of cyber security in their personal, financial and business lives while encouraging them to evaluate their cyber risk and take action to improve it.

World's Most Famous Hacker Kevin Mitnick: IoT Is Exploitable

Clad in a blue suit and conservative necktie, KnowBe4's Chief Hacking Officer Kevin Mitnick no longer looks the part of the precocious teen who started hacking into computer systems while still in high school.

But when asked if any system is unhackable, there’s a youthful gleam in his eyes.

"I don’t know any system out there that’s impenetrable,” Mitnick told an audience of about 1,500 engineers at the Freescale Technology Forum (FTF) in Austin, Texas this week. “In our experience, when we are hired by clients to attack their systems, our success rate is 100%.”

Mitnick, who goes by “the world’s most famous hacker,” knows about computer vulnerabilities. His resumé is replete with conquests of 40 major corporations. He once had the dubious distinction of being on the FBI’s Most Wanted list, and spent prison time in solitary confinement because prosecutors feared he could break into NORAD computers from his cell and launch nuclear missiles.

The pictures show Kevin talking about security with Freescale Semiconductor CEO Gregg Lowe. 

At this week’s FTF conference, Mitnick focused on the growing influence of the Internet of Things (IoT), and the possibility of such applications being easily compromised. He suggested that the IoT has many of the same issues that now face corporate computer networks. Lack of encryption, authentication weaknesses, and password reset problems are just as likely to compromise the security of IoT applications, he said.

Kevin Mitnick Selling 0-day Exploits Is A Good Idea

OK, so here is my take on the recent hatchet job by WIRED Magazine.

Kevin Mitnick at Black Hat 2014

I was at Black Hat 2014, and Kevin Mitnick was also at at the show. He signed 700 books in a 3-hour span, whew! Here is the line that ran all the way back to the show floor. I took this shot at the FireMon booth, where everyone got their picture taken with Kevin, which was incredibly popular:

NEW Kevin Mitnick VIDEO: The Word Document Exploit

Check out a brand new 3:25 min Kevin Mitnick video where he shows live how an infected Word document allows a hacker to steal the employee's user name and password. This is just one of the videos in the new Kevin Mitnick Security Awareness Training 2014 that KnowBe4 is releasing at the moment.

Kevin Mitnick Security Awareness Training 2014

Kevin Mitnick Details Modern IT Threats; spear phishing and more

One of the most infamous hackers of all time talks about Website security and what users should do to protect themselves. In the world of computer security hackers, few are as well-known as Kevin Mitnick. Mitnick's activities in the mid-1990s led to his arrest by the FBI and subsequent imprisonment.

Subscribe To Our Blog

Phish Your Users




Get the latest about social engineering

Subscribe to CyberheistNews