Kevin Mitnick, from hacker to king of cybersecurity

In the 90s, Mitnick put the FBI's research department in check by being the most wanted hacker in the United States.

Although Kevin Mitnick currently does not like to be called a hacker, the fact is that in the 90s he put the FBI investigation department in check by being the most wanted hacker in the United States.

Today, Mitnick has managed to transform those skills and become an important cybersecurity consultant for the companies against which he has tried at some time.

During his exhibition at Talent Land 2018 , an event held at Expo Guadalajara, he confessed that his taste for exploring in the computer world began at a young age since being a fanatic of magic he realized that the laws were not so restrictive.

At age 12, he ventured into phreaking (intrusion in telephone networks) , an activity that allowed him to call anywhere in the world without cost, just by entering a five-digit code. And it was from there that he learned the basics of social engineering, a tool that allowed him to commit his first cybernetic attacks, which he showed in front of all the attendees.

With these and other techniques Mitnick managed to access highly protected systems of technological giants such as Nokia and Motorola.

Nowadays he is an example of resilience since after being sentenced to five years in prison and released in 2002, he is a lecturer and directs his own security consultancy firm, Mitnick Security Consulting.

Source: El Sol de Acapulco

Topics: Social Engineering, Expo Guadalajara, keynote speaker, Mexico, Motorola, Nokia, phreaking, security consultant, Mitnick Security Consulting, Talent Land 2018, cybersecurity consultant, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Red Team Testing vs. Penetration Testing

As the cost of cyber attacks continues to grow — in 2023, the worldwide cost of cyber attacks reached $8 trillion and, by 2025, the total cost is esti..

Read more ›

What Is Credential Harvesting and How Do Threat Actors Pull It Off?

Credential harvesting, otherwise known as credential compromising or credential theft, can be a highly devastating cyber threat. It also happens to be..

Read more ›

How Threat Actors Bypass 2FA and What Preventative Steps You Can Take

Two-factor authentication (2FA, or MFA) is a security layer designed to verify the identity of those logging in to accounts. By sending codes to the p..

Read more ›
tech-texture-bg