Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studi ...more
This book focuses on the human element of computer security. Reminding us that eve ...more
A number of problems prevented this book from being very good. The main problem is simply that Mitnick did not have enough material to fill an entire book. This book would have been better if it were shorter and simply one section in a larger book ab ...more
The anecdotes are more interesting than entertaining, and all proceed by the same b ...more
In the first chapter of his book, usually referred to as The Lost Chapter (As it wasn't published with the final version of the book), Kevin Mitnick tries to convince his readers that he is innocent – or at least ...more
Me crucé con este libro (está en la mula, por supuesto) y me lo he devorado en dos días. Hay una segunda parte, The Art of Intrusion, que parece que está incluso mejor.
Kevin Mitnick se hizo bastante famoso, para su desgracia, cuando le condenaron a unos cuantos años de cárcel por diversos delitos contra la seguridad electrónica de varias empresas y agencias estatales norteamericanas (nada grave según él, el holocausto informático según el fiscal). La Wikipedia (Kevin Mitnick, Kevin Mitnick ) cu...more
Sometimes the book feels dated though when talking about telephone system hackers and how they use the system for their own purposes, posing as an onsite engineer trying to get something fixed and enlisting the help of ‘colleagues’ at the phone company, because the stuff they are doing onsite is nowadays done remotely. Luckily what is done ...more
It is quite clear that Mitnick wishes the book to be viewed as an attempt at redemption.
The cons are easy to read and do offer some genuine insights but not all are believable. The supporting material discussing these scenarios is pretty weak.
There's a rigid format ("Analyzing the con," "Preventing the con," e ...more
Picked up this one to read about Social Engineering from a guy who used to wear a black hat. since it was written over 12 years ago, some of the technical stuff is not quite accurate, but the types of cons presented here in story from could still happen.
Knowledge is power and the best defense against the Social Engineer. So who better to learn defensive techniques from than the world's most infamous hacker and social engineer? M ...more
It serves as a how-to, and to a lesser extent a how-to-prevent, book on social engineering attacks. Most professionals in the industry understand that attacks are rarely purely technology-based. Much more often companies are compromised through a combination of human and computer vulnerabilities.
This book focuses on the human component of such attacks and is written from the perspective of someone who was extremely effective at executing such attacks. Though I was alre ...more
Libro decisamente interessante che utilizzando lo stile delle storie brevi propone un panorama molto vario di tecniche di ingegneria sociale in presa diretta da storie realmente accadute. Ha l'innegabile merito di aiutare a far luce, grazie alla competenza in materia dell'autore, delle tecniche utilizzate da chi con abilita' e mestiere riesce a modificare i comportamenti delle persone per i propri scopi. Tali pratiche da sempre potenzialmente dannose tendono ad ...more
Soweit ich mich erinnere, in Deutschland, 2003 erschienen.
Kevin Mitnick, der in den 1980gern meist gesuchte "Hacker", seine Spezialität "Manipulation" von Menschen, Social Engineering.
Some of the 'examples' used are repeated in Kevin's other book, Ghost in the Wires, which I read before this one. GitW is a good read, this one, not so much.....
The topic is very relevant, and IMO is likely to always be.
What I would've like to see more of is psycology and research on human behaviors. To me, this book states the obvious, without really digging into the mechanisms that drive people into the actions they take. It does go a way to explain, but the explanations are mainly base ...more
The last 20% or so of the book is really a security policy of sorts - interesting enough if you need that kind of thing (what to do and not do) but a little less in ...more