MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
October 15, 2002
Daintry Duffy
The Weakest Link Humans are the weak link in any corporation's carefully crafted security perimeter. That's the prevailing theme of Kevin Mitnick's new book, The Art of Deception: Controlling the Human Element of Security. mark for My Articles similar articles
New Architect
February 2003
Book Reviews The Art of Deception and XML: A Manager's Guide, 2nd Edition mark for My Articles similar articles
Wired
Steven Levy
Wizzywig Cartoonist Inks a Phreakin' Comic Book Ever since Kevin Mitnick's notorious exploits of the early 1990s, commentary inspired by the dark-side hacker has proliferated. The latest entry is Wizzywig, a four-part graphic novel by Ed Piskor. mark for My Articles similar articles
InternetNews
March 30, 2004
Vince Barnes
An Hour with Kevin Mitnick In part one of a candid discussion, former hacker Kevin Mitnick tackles the issue of hiring hackers, talks about his consulting business, book, and expert testimonies on computer hacking and security. mark for My Articles similar articles
InternetNews
April 7, 2004
Vince Barnes
An Hour with Kevin Mitnick, Part 2 We conclude our talk with Kevin Mitnick as he provides a glimpse into the mindset of a hacker, discusses attitudes toward security spending and gives a reason to think twice before taking caller ID at face value. mark for My Articles similar articles
Fast Company
June 2013
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
CIO
December 16, 2009
Robert McMillan
Five Things You Need to Know About Social Engineering How hackers can steal your data. mark for My Articles similar articles
CIO
April 15, 2003
Michael Schrage
What Price Security? It's up to the company, not the CIO, to decide how much trust is too much. mark for My Articles similar articles
PC Magazine
August 23, 2007
John Brandon
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. mark for My Articles similar articles