Tuesday, October 14, 2025
HomeTechnologyHow to suppose like a hacker and shield your knowledge

How to suppose like a hacker and shield your knowledge


How do hackers hack?

What instruments and strategies are generally used towards organizations to realize unauthorized entry to their methods?

Where can I study extra about how hackers suppose and the right way to finest shield my private {and professional} knowledge?

How are you able to cease (or cease) data theft?

Who is Mishal Khan?

A number of weeks in the past, I used to be in Las Vegas attending the World Game Protection Conference as an invited keynote speaker protecting the subject of ransomware. The presentation that I simply gave on the primary stage was given by Mishal Khan, and he talked about how hackers “do what they do”, usually utilizing data that’s publicly out there to everybody on-line. I gave a enjoyable keynote speech the place I defined the right way to use it.

Not solely did I get pleasure from and study from Mr. Khan’s presentation, however I additionally had a number of follow-up conversations with him about cybersecurity, hacking, trade developments, and extra. I used to be impressed by his ardour, experience, and his function as a vCISO and cybersecurity apply chief along with his hacking function. Mishal can be an advocate for enhancing privateness on-line, providing tricks to his viewers on the right way to shield their knowledge.

To study extra about Khan, take a look at his web site bio. He is the co-author of The Phantom CISO and leans into the “hoodie-wearing hacker” persona that many within the cybersecurity trade draw back from. His web site additionally affords many shows, podcasts, and different on-line cyber assets.

Mishal.jpg

Dan Roman (DL): Did you at all times wish to be a hacker? When did you understand you “suppose like a hacker”?

Mishal Khan (MK): Thanks to my father’s pc restore store, I’ve been immersed on the planet of devices and pc components since center faculty. Surrounded by the noise of pc followers, I could not assist however be drawn into the complicated workings of computer systems. As I discovered extra in regards to the {hardware}, I discovered myself tinkering endlessly by overclocking the CPU, boosting the cooling system with extra followers, and increasing reminiscence and storage capability. But it wasn’t simply the {hardware} that fascinated me. What actually ignited my ardour was the fascination with unlocking the potential hidden in software program.

When I began taking part in PC video games, I stumbled throughout cheat codes for traditional video games like DOOM and my curiosity was piqued. What if I may manipulate the very construction of the sport itself? This would permit me to dig into supply information and tweak traces of code to bend the sport to my needs, or skip ranges with a couple of keystrokes. I went on a path of exploration.

But my journey did not finish there. With the daybreak of the Internet, I discovered myself entering into the unexplored frontier of internet design. Here, the boundaries have been much more fluid and the probabilities appeared limitless. As I developed my abilities, I found the fun of tearing down an internet site and rebuilding it stronger and extra resilient than earlier than. It was a dance between creativity and chaos, and each bug squashed and each glitch overcome solely whet the urge for food for extra.

That’s after I realized I used to be considering like a hacker. I do not imply it in a malicious approach, however in a relentless pursuit to know how issues truly work. I turned hooked on the frenzy of cracking codes and unraveling intricacies, and every new problem drove me to push the boundaries additional. And I have never stopped since.

DL: Please inform us about your profession path in hacking/skilled cyberwork.
MK: I began my skilled profession in networking and studying how data travels on the Internet. Understanding this course of, from typing on the keyboard to seeing outcomes on display screen, turned my best talent and shaped a robust baseline of my experience.

Although I knew so much about moral hacking, I could not discover a job within the cybersecurity subject as a result of I did not have the related {qualifications} or expertise. So I made a decision to start out my very own firm. I present primary cybersecurity companies totally free to nonprofits and startups, together with assessing their safety posture, making their units safer, establishing safety instruments, testing their methods for vulnerabilities, and performing penetration assessments. did.

I labored laborious attending occasions, running a blog, talking, and constructing my private model. Slowly however absolutely, I began getting seen and getting some first rate enterprise. Eventually, a bigger firm took discover and employed me to guide their cybersecurity efforts. At that point, I began a digital CISO apply to supply safety companies to different organizations. This was the height of my journey from small beginnings to changing into an trade chief and finally publishing a e book about it.

DL: What is OSINT?
MK: One of my first pursuits was taking part in on-line surveys and mining the Internet for data. Whether it is uncovering hidden knowledge in picture information or piecing collectively clues from social media profiles, use these abilities to assist others going through issues with hackers and stalkers. I felt a way of satisfaction. Over time, this subject developed into what’s now referred to as Open Source Intelligence Collection (OSINT).

OSINT revolves round accumulating publicly out there data and reworking it into actionable intelligence. This intelligence can be utilized for a wide range of functions, together with figuring out criminals, establishing information, discovering lacking individuals, conducting due diligence, and uncovering the reality behind complicated conditions. The great amount of information out there as of late makes it a strong device for each people and organizations seeking to successfully navigate the digital panorama.

DL: Why is it simple to hack people and organizations utilizing OSINT?
MK: Most hacking as we speak depends closely on social engineering ways, the place hackers exploit human vulnerabilities slightly than instantly focusing on methods. Hackers use publicly out there data to govern people into unwittingly supporting their plans. This is the place his OSINT is available in as step one within the hacker’s reconnaissance course of.

The extra data a hacker gathers a couple of goal, the extra highly effective the assault turns into. Imagine if a hacker knew your particular pursuits and even your whereabouts primarily based in your social media exercise. Armed with this data, they will craft convincing phishing emails and chilly calls to trick customers into clicking on malicious hyperlinks or divulging delicate data they would not usually share. This is a solemn reminder of how essential it’s to guard our on-line presence and stay vigilant towards such ways.

DL: What are two or three issues the common individual can do to maintain their life extra personal (and safe)?
MK: If you undertake a hacker mindset, you will need to prioritize defending data that may very well be misused. An essential defensive tactic is to keep away from sharing private data on social media platforms, similar to location data, cellphone numbers, private e-mail addresses, and household data. These easy steps can cease nearly all of social engineering assaults.

Additionally, eradicating your self from infamous knowledge brokers and people-finding web sites could make it harder for malicious attackers to acquire your own home deal with or private mobile phone quantity. We extremely suggest going one step additional and freezing your credit score on the web sites of high credit score bureaus. This proactive measure might help forestall widespread identification theft scams that depend on the usage of Social Security numbers.

Finally, it is most essential to strengthen the safety of your essential on-line accounts, similar to e-mail, banking, social media, and utilities. Leverage robust passwords generated by a password supervisor and implement multi-factor authentication every time attainable. These easy measures will vastly enhance your safety towards unauthorized entry and potential breaches of your account.

DL: You have not too long ago spoken at a number of state cyber summits and different occasions. Please inform us about what you will have printed.
MK: We love entertaining our viewers with easy but awe-inspiring hacks and placing them on the middle of the motion to witness first-hand the intricacies of cyberattacks. My mission is to boost consciousness in regards to the strategies utilized by hackers in order that people can take significant steps to guard themselves. By revealing how hackers hack, we purpose to make safety measures extra impactful and significant to everybody.

I imagine it can be crucial for everybody to develop safety consciousness throughout the boundaries between cybersecurity and different domains it impacts. Bridging this hole can foster a safer digital surroundings for each people and organizations.

DL: Is there the rest you wish to add?
MK: The battle over privateness and safety is actual, however we’re far behind. We collectively have a duty to make use of our abilities to guard these round us, even when it is only one individual at a time. Let’s face challenges and create change, one step at a time.



Source hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Popular