Cyber Security Articles & News

From “prankster” to the hacker, or how Kevin Mitnick started

Kevin Mitnick is the most famous hacker in the world. For years, however, has been working on the side of "the good ones". Companies hire Mitnick to help protect their valuable data.

During the Business Insider Inside Trends conference, Kevin Mitnick told about the beginnings of his stormy career with computers in the background - he finally spent five years in prison.

Telephone tips

Mitnicka's adventure with hacking began because he was fascinated by tricks as a young boy . At school, friends showed him, among others telephone tricks. A telephone to a special number made it possible to find out what number the connection was previously received from. Tapping the secret code allowed you to make a connection to anywhere in the world for free. - I was a bachelor . I wanted to learn these techniques to make jokes - said Mitnick during the Business Insider Inside Trends conference.

This is the so-called "phreaking" (from the English words "freak" and "phone"). Similar "games" were dealt with, among others, Steve Wozniak, one of the founders of Apple . He constructed so-called blue boxes , or devices that allow hacking analog phones to make free calls from them.Also, the money from the sale of such devices was to be used to partially finance work on the company's computers, and Wozniak also said that he even made a connection to the Pope and gave up for Henry Kissinger.

Information technology at school

Interestingly, Mitnick remarked that initially he was not too interested in IT at school. - Writing programs at school was boring. I wanted to do something cool - said Mitnick.


Young Kevin Mitnick did not do one of the homework, which was to rely on the representation of the Fibonacci sequence. Instead, he created a program that ... stole the IT teacher's password. He would react to the program shown with a big smile and say: "this is great."

Mitnick remarked that now his IT teacher may regret his words of encouragement to further develop computer skills.

Kevin Mitnick won global fame in the early 90s when he was wanted by the FBI. For over a dozen years, it helps companies to check their security. He repeatedly proved that it is "social engineering" , that is, proper manipulation of people and drawing information from them, is crucial in acquiring other people's data or access to information systems - even in the case of global corporations.

For this original article and other great business articles, please refer to the source.


Topics: Social Engineering, Poland, data protection, Inside Trends, keynote speaker, Steve Wozniak, telephone phreaking, blue boxes, password theft, Fibonacci sequence, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What is External Network Pentesting?

If your organization has conducted a penetration test in the past, it was likely one of six main types of pentests. 

Read more ›

6 FAQs From CISOs About the Pentesting Process

As a Chief Information Security Officer (CISO), you have the responsibility of not only directing your organization’s security but also conveying your..

Read more ›

How Technology is Changing the Future of Social Engineering

Social engineering is not a new concept; in fact, it was said to have originated in 1184 BC with the legendary tale of the Trojan Horse. But since the..

Read more ›