The Big Story: Today’s Hackers Use ‘Soft’ Approach

“It is not a blunt-force hacker who is breaching your system without you knowing about it. It is trying to get in through another door,” says NADA’s Brad Miller.

Steve Finlay, Contributing Editor

October 24, 2016

1 Min Read
Hackers a threat.

Standing on stage and behind a bank of four computers, former master hacker and ex-con Kevin Mitnick shows how he can break into digital systems to steal data.

He makes it look easy during the presentation entitled “Cyber Security: Art of Deception” at the American Financial Services Assn.’s annual Vehicle Finance Conference.

Steve Wosniak, an Apple co-founder, introduces him at the conference, saying “He can hack into any system.” For the next hour, Mitnick, who now runs a cyber-security consulting firm, shows and tells how.

But few of his means of entry involve a blunt-force frontal assault. Typically today, with systems as secure as they are, hackers need help to get the job done. And often, the helpers are employees at a place of business who unwittingly become aiders and abettors.

About the Author

Steve Finlay

Contributing Editor

Steve Finlay is a former longtime editor for WardsAuto. He writes about a range of topics including automotive dealers and issues that impact their business.

Subscribe to a WardsAuto newsletter today!
Get the latest automotive news delivered daily or weekly. With 6 newsletters to choose from, each curated by our Editors, you can decide what matters to you most.

You May Also Like