LISTEN: Infamous Hacker Kevin Mitnick Tells Us How He Created Fake Identities

Once arrested by the FBI, Mitnick tells us how to keep information private online.

Radio Motherboard sits down with infamous hacker and computer security expert Kevin Mitnick—aka The Condor—to discuss internet safety, online privacy, and the art of hacking.

A longtime code breaker and hacker, Mitnick was arrested in 1995 by the FBI for a laundry list of crimes, including gaining unauthorized access to dozens of computer networks and hacking into private emails and databases. The case was highly publicized and sparked a national conversation around cyber crime, becoming one of the first major controversies of the digital age.

Mitnick is now a consultant and author, and travels the country giving lectures on cyber security. In this episode we talked to him about his illustrious and oftentimes dangerous career as a hacker, which started at the age of 13 and culminated in his dramatic '95 arrest. We also touch on the pressingly urgent themes in his new book, The Art of Invisibility, exploring the notions of safety and privacy in an increasingly invasive digital landscape.

As a hacker and now as a security consultant, Mitnick has worked both inside and outside of the system, studying our online framework from angles that the average internet user cannot possibly access. He had some wisdom to share with us about keeping our information private online.

Listen to this cool radio program here: https://motherboard.vice.com/en_us/article/d38mjz/infamous-hacker-kevin-mitnick-tells-us-how-he-created-fake-identities 

Source: Radio Motherboard

Topics: Speaking Engagements, The Art of Invisibility, virtual machines, CFAA, cloudbleed, encryption, cyber law, fake identities, FBI, hacking, online privacy, phone phreaking, internet safety, Apple, cell phone source codes, Cloud Flare Data Leak, cyber crime, cyber exploitation, heartbleed, iOS, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg