Kevin Mitnick, from hacker to king of cybersecurity

In the 90s, Mitnick put the FBI's research department in check by being the most wanted hacker in the United States.

Although Kevin Mitnick currently does not like to be called a hacker, the fact is that in the 90s he put the FBI investigation department in check by being the most wanted hacker in the United States.

Today, Mitnick has managed to transform those skills and become an important cybersecurity consultant for the companies against which he has tried at some time.

During his exhibition at Talent Land 2018 , an event held at Expo Guadalajara, he confessed that his taste for exploring in the computer world began at a young age since being a fanatic of magic he realized that the laws were not so restrictive.

At age 12, he ventured into phreaking (intrusion in telephone networks) , an activity that allowed him to call anywhere in the world without cost, just by entering a five-digit code. And it was from there that he learned the basics of social engineering, a tool that allowed him to commit his first cybernetic attacks, which he showed in front of all the attendees.

With these and other techniques Mitnick managed to access highly protected systems of technological giants such as Nokia and Motorola.

Nowadays he is an example of resilience since after being sentenced to five years in prison and released in 2002, he is a lecturer and directs his own security consultancy firm, Mitnick Security Consulting.

Source: El Sol de Acapulco

Topics: Social Engineering, Expo Guadalajara, keynote speaker, Mexico, Motorola, Nokia, phreaking, security consultant, Mitnick Security Consulting, Talent Land 2018, cybersecurity consultant, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Redefining Your Enterprise’s Cyber Security Posture During Mergers & Acquisitions

With 3,205 data compromises occurring in 2023 alone, fortifying your enterprise’s cybersecurity posture is more important than ever.

Read more ›

Choosing a Penetration Testing Company for Mac-based Environments

Powering your business with Apple devices because of their reputable security and privacy features? You may be surprised to learn that while Apple dev..

Read more ›

AI in Cyber Security: Impacts, Benefits, and More To Be Aware Of

Artificial intelligence in cybersecurity has been a hot topic lately, especially with the rise of OpenAI’s ChatGPT. But does that mean it would make a..

Read more ›
tech-texture-bg