Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studi ...more
This book focuses on the human element of computer security. Reminding us that eve ...more
Reading ‘The Art of Deception’ is like hearing it straight from the horse's mouth. Kevin D. Mitnick, one of the legendary cyber desperado turned computer security consultant, takes the reader into the complex, supremely confident – often misunderstood as arrogance and curiosity ...more
A number of problems prevented this book from being very good. The main problem is simply that Mitnick did not have enough material to fill an entire book. This book would have been better if it were shorter and simply one section in a larger book ab ...more
The anecdotes are more interesting than entertaining, and all proceed by the same b ...more
In the first chapter of his book, usually referred to as The Lost Chapter (As it wasn't published with the final version of the book), Kevin Mitnick tries to convince his readers that he is innocent – or at least ...more
It's clear that Mitnick thinks very highly of himself and his accomplishments, occa ...more
The fourth part of the book was a laundry list of policies to put in place to defend against social engineering.
As someone who works in a company that has pre ...more
Me crucé con este libro (está en la mula, por supuesto) y me lo he devorado en dos días. Hay una segunda parte, The Art of Intrusion, que parece que está incluso mejor.
Kevin Mitnick se hizo bastante famoso, para su desgracia, cuando le condenaron a unos cuantos años de cárcel por diversos delitos contra la seguridad electrónica de varias empresas y agencias estatales norteamericanas (nada grave según él, el holocausto informático según el fiscal). La Wikipedia (Kevin Mitnick, Kevin Mitnick ) cu...more
Sometimes the book feels dated though when talking about telephone system hackers and how they use the system for their own purposes, posing as an onsite engineer trying to get something fixed and enlisting the help of ‘colleagues’ at the phone company, because the stuff they are doing onsite is nowadays done remotely. Luckily what is done ...more
It is quite clear that Mitnick wishes the book to be viewed as an attempt at redemption.
The cons are easy to read and do offer some genuine insights but not all are believable. The supporting material discussing these scenarios is pretty weak.
There's a rigid format ("Analyzing the con," "Preventing the con," e ...more
Reading the book feels like listening to a security guard recount stories of all the things he's seen in his day. This is good for entertainment, but isn't appreciated it when the book is on "how to control the human element of security", and not "20 stories about how this one time a guy did a bad thing".
I'd pass on reading this book.
Additionally, the end result is that no company can ever be completely immune from social engineering attack - no surprises there.
Picked up this one to read about Social Engineering from a guy who used to wear a black hat. since it was written over 12 years ago, some of the technical stuff is not quite accurate, but the types of cons presented here in story from could still happen.
Knowledge is power and the best defense against the Social Engineer. So who better to learn defensive techniques from than the world's most infamous hacker and social engineer? M ...more
It serves as a how-to, and to a lesser extent a how-to-prevent, book on social engineering attacks. Most professionals in the industry understand that attacks are rarely purely technology-based. Much more often companies are compromised through a combination of human and computer vulnerabilities.
This book focuses on the human component of such attacks and is written from the perspective of someone who was extremely effective at executing such attacks. Though I was alre ...more
Libro decisamente interessante che utilizzando lo stile delle storie brevi propone un panorama molto vario di tecniche di ingegneria sociale in presa diretta da storie realmente accadute. Ha l'innegabile merito di aiutare a far luce, grazie alla competenza in materia dell'autore, delle tecniche utilizzate da chi con abilita' e mestiere riesce a modificare i comportamenti delle persone per i propri scopi. Tali pratiche da sempre potenzialmente dannose tendono ad ...more
Soweit ich mich erinnere, in Deutschland, 2003 erschienen.
Kevin Mitnick, der in den 1980gern meist gesuchte "Hacker", seine Spezialität "Manipulation" von Menschen, Social Engineering.