MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
October 1, 2003
Gary Beach
Beware of the Telephone Most of your employees think hacks originate via a computer. According to Kevin Mitnick, they'd be wrong. Mitnick knows the weakest link in corporate infrastructure security: human beings. mark for My Articles similar articles
InternetNews
March 30, 2004
Vince Barnes
An Hour with Kevin Mitnick In part one of a candid discussion, former hacker Kevin Mitnick tackles the issue of hiring hackers, talks about his consulting business, book, and expert testimonies on computer hacking and security. mark for My Articles similar articles
New Architect
February 2003
Book Reviews The Art of Deception and XML: A Manager's Guide, 2nd Edition mark for My Articles similar articles
Wired
Steven Levy
Wizzywig Cartoonist Inks a Phreakin' Comic Book Ever since Kevin Mitnick's notorious exploits of the early 1990s, commentary inspired by the dark-side hacker has proliferated. The latest entry is Wizzywig, a four-part graphic novel by Ed Piskor. mark for My Articles similar articles
CIO
April 15, 2003
Michael Schrage
What Price Security? It's up to the company, not the CIO, to decide how much trust is too much. mark for My Articles similar articles
The Motley Fool
July 23, 2009
Tim Beyers
This Mistake Could Ruin Your Financial Life Personal digital security has never been more important. mark for My Articles similar articles
InternetNews
April 7, 2004
Vince Barnes
An Hour with Kevin Mitnick, Part 2 We conclude our talk with Kevin Mitnick as he provides a glimpse into the mindset of a hacker, discusses attitudes toward security spending and gives a reason to think twice before taking caller ID at face value. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles