shadow protocol logo two

Hacking

Farewell to a Legend: Kevin Mitnick, Renowned Hacker Turned Cybersecurity Superstar

The underground comes to a somber standstill today as we bid farewell to one of our own, Kevin Mitnick, a legendary hacker, security consultant, author, and occasional fugitive. Mitnick, one of the most infamous computer criminals of the ’90s, hung up his hat after a long battle with pancreatic cancer. He breathed his last on Sunday at the age of 59, as confirmed by cybersecurity training company co-founded by Mitnick, KnowBe4 and King David Memorial Chapel & Cemetery in Las Vegas.

Dive Deeper »

No Code, Just Con: Social Engineering and the Art of Human Exploitation

These aren’t your classic tales of cracking the code, but one of crafting the grand con of swindling in broad cyber-light. That’s right, my fellow hackers; it isn’t always the glitch in the matrix or a hidden backdoor that gives us the keys to the kingdom. Sometimes, it’s just exploiting the glitchy flawed homo sapiens on the other side of the screen – a classic trick in the hacker repertoire, also known as social engineering.

Dive Deeper »

Farewell to a Legend: Kevin Mitnick, Renowned Hacker Turned Cybersecurity Superstar

The underground comes to a somber standstill today as we bid farewell to one of our own, Kevin Mitnick, a legendary hacker, security consultant, author, and occasional fugitive. Mitnick, one of the most infamous computer criminals of the ’90s, hung up his hat after a long battle with pancreatic cancer. He breathed his last on Sunday at the age of 59, as confirmed by cybersecurity training company co-founded by Mitnick, KnowBe4 and King David Memorial Chapel & Cemetery in Las Vegas.

Dive Deeper »

No Code, Just Con: Social Engineering and the Art of Human Exploitation

These aren’t your classic tales of cracking the code, but one of crafting the grand con of swindling in broad cyber-light. That’s right, my fellow hackers; it isn’t always the glitch in the matrix or a hidden backdoor that gives us the keys to the kingdom. Sometimes, it’s just exploiting the glitchy flawed homo sapiens on the other side of the screen – a classic trick in the hacker repertoire, also known as social engineering.

Dive Deeper »