New Exploit Hacks LinkedIn 2-Factor Authentication, With Kevin Mitnick
Kevin Mitnick shows how the exploit is based on a credentials phishing attack that uses a typo-squatting domain. Once the user falls for this social engineering tactic and enters their credentials, the 2FA token gets intercepted and it's easy to hack into the LinkedIn account.
What percentage of your users would click on that link? Find out now with your free Phishing Security Test: https://www.knowbe4.com/phishing-security-test-offer?utm_source=YouTube&utm_medium=promo-video&utm_campaign=PST
Subscribe to KnowBe4 so that you never miss other security awareness tutorials like these!
http://www.knowbe4.com
Видео New Exploit Hacks LinkedIn 2-Factor Authentication, With Kevin Mitnick канала KnowBe4
What percentage of your users would click on that link? Find out now with your free Phishing Security Test: https://www.knowbe4.com/phishing-security-test-offer?utm_source=YouTube&utm_medium=promo-video&utm_campaign=PST
Subscribe to KnowBe4 so that you never miss other security awareness tutorials like these!
http://www.knowbe4.com
Видео New Exploit Hacks LinkedIn 2-Factor Authentication, With Kevin Mitnick канала KnowBe4
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
How Easy It Is To Crack Your Password, With Kevin MitnickBest of Kevin Mitnick: My Favorite HackWhy You Should Turn On Two Factor AuthenticationKevin Mitnick: How to Troll the FBI | Big Think2FA: Two Factor Authentication - ComputerphileKevin Mitnick on the WhatsApp Hack'Use VPN!' Former 'Most Wanted Hacker' Mitnick talks Snowden, NSA, privacyHacker Explains One Concept in 5 Levels of Difficulty | WIREDHow easy is it to capture data on public free Wi-Fi? - Gary explainsBypassing multi factor authentication - Shahmeer Amir, HackIT-2017Kevin Mitnick: Live Hack at CeBIT Global Conferences 2015Best of Kevin Mitnick: FBI DoughnutsHere's how hackers can get around 2-factor authenticationMy Adventures as the World's Most Wanted Hacker | Kevin Mitnick | Talks at GoogleNew USB Attack Vector With Kevin Mitnick | Malware-Infected USB CablesKevin Mitnick Demonstrates Ransomcloud | Ransomware DemoCybersecurity Expert Demonstrates How Hackers Easily Gain Access To Sensitive InformationPassword bypassing ข้ามหัวรหัสผ่าน12 Ways to Hack 2FAUSB Ninja With Kevin Mitnick | How You Can Be Hacked Using a USB Cable