MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
October 15, 2002
Daintry Duffy
The Weakest Link Humans are the weak link in any corporation's carefully crafted security perimeter. That's the prevailing theme of Kevin Mitnick's new book, The Art of Deception: Controlling the Human Element of Security. mark for My Articles similar articles
CIO
July 14, 2008
Jarina D'Auria
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. mark for My Articles similar articles
PC Magazine
August 23, 2007
John Brandon
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. mark for My Articles similar articles
Fast Company
June 2013
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. mark for My Articles similar articles
CIO
October 1, 2003
Gary Beach
Beware of the Telephone Most of your employees think hacks originate via a computer. According to Kevin Mitnick, they'd be wrong. Mitnick knows the weakest link in corporate infrastructure security: human beings. mark for My Articles similar articles
Wired
Steven Levy
Wizzywig Cartoonist Inks a Phreakin' Comic Book Ever since Kevin Mitnick's notorious exploits of the early 1990s, commentary inspired by the dark-side hacker has proliferated. The latest entry is Wizzywig, a four-part graphic novel by Ed Piskor. mark for My Articles similar articles
New Architect
February 2003
Joseph C. Panettieri
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. mark for My Articles similar articles
InternetNews
April 7, 2004
Vince Barnes
An Hour with Kevin Mitnick, Part 2 We conclude our talk with Kevin Mitnick as he provides a glimpse into the mindset of a hacker, discusses attitudes toward security spending and gives a reason to think twice before taking caller ID at face value. mark for My Articles similar articles
New Architect
February 2003
Book Reviews The Art of Deception and XML: A Manager's Guide, 2nd Edition mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
PC World
April 10, 2001
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... mark for My Articles similar articles
Salon.com
August 29, 2001
Damien Cave
How do you fix a leaky Net? Brian West says he was doing a public service when he pointed out a security hole in an Oklahoma newspaper's Web site. So why did the editor in chief call the cops? mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles