Cyber Security Articles & News

Kevin Mitnick, from hacker to king of cybersecurity

In the 90s, Mitnick put the FBI's research department in check by being the most wanted hacker in the United States.

Although Kevin Mitnick currently does not like to be called a hacker, the fact is that in the 90s he put the FBI investigation department in check by being the most wanted hacker in the United States.

Today, Mitnick has managed to transform those skills and become an important cybersecurity consultant for the companies against which he has tried at some time.

During his exhibition at Talent Land 2018 , an event held at Expo Guadalajara, he confessed that his taste for exploring in the computer world began at a young age since being a fanatic of magic he realized that the laws were not so restrictive.

At age 12, he ventured into phreaking (intrusion in telephone networks) , an activity that allowed him to call anywhere in the world without cost, just by entering a five-digit code. And it was from there that he learned the basics of social engineering, a tool that allowed him to commit his first cybernetic attacks, which he showed in front of all the attendees.

With these and other techniques Mitnick managed to access highly protected systems of technological giants such as Nokia and Motorola.

Nowadays he is an example of resilience since after being sentenced to five years in prison and released in 2002, he is a lecturer and directs his own security consultancy firm, Mitnick Security Consulting.

Source: El Sol de Acapulco

Topics: Social Engineering, Expo Guadalajara, keynote speaker, Mexico, Motorola, Nokia, phreaking, security consultant, Mitnick Security Consulting, Talent Land 2018, cybersecurity consultant, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration t..

Read more ›

What Is Pivoting in Cyber Security and What Does It Mean for Pentesters?

Data breaches in 2022 were abundant and sophisticated. Realistically, it’s expected that this year we will continue to see threat actors test their li..

Read more ›

What Is One-time Password (OTP) Social Engineering?

Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: ..

Read more ›
tech-texture-bg