LISTEN: Infamous Hacker Kevin Mitnick Tells Us How He Created Fake Identities

Once arrested by the FBI, Mitnick tells us how to keep information private online.

Radio Motherboard sits down with infamous hacker and computer security expert Kevin Mitnick—aka The Condor—to discuss internet safety, online privacy, and the art of hacking.

A longtime code breaker and hacker, Mitnick was arrested in 1995 by the FBI for a laundry list of crimes, including gaining unauthorized access to dozens of computer networks and hacking into private emails and databases. The case was highly publicized and sparked a national conversation around cyber crime, becoming one of the first major controversies of the digital age.

Mitnick is now a consultant and author, and travels the country giving lectures on cyber security. In this episode we talked to him about his illustrious and oftentimes dangerous career as a hacker, which started at the age of 13 and culminated in his dramatic '95 arrest. We also touch on the pressingly urgent themes in his new book, The Art of Invisibility, exploring the notions of safety and privacy in an increasingly invasive digital landscape.

As a hacker and now as a security consultant, Mitnick has worked both inside and outside of the system, studying our online framework from angles that the average internet user cannot possibly access. He had some wisdom to share with us about keeping our information private online.

Listen to this cool radio program here: https://motherboard.vice.com/en_us/article/d38mjz/infamous-hacker-kevin-mitnick-tells-us-how-he-created-fake-identities 

Source: Radio Motherboard

Topics: The Art of Invisibility, virtual machines, CFAA, cloudbleed, encryption, cyber law, fake identities, FBI, hacking, keynote speaker, online privacy, phone phreaking, internet safety, Apple, cell phone source codes, Cloud Flare Data Leak, cyber crime, cyber exploitation, heartbleed, iOS, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

PCI Testing: Everything You Need To Know

Penetration testing is crucial for businesses to help ensure that their security posture will stand against threat actors. For businesses that handle ..

Read more ›

The 4 Phases of Penetration Testing

So, you’ve done your research on penetration testing and are ready for the pentest engagement. But before you choose just any pentesting vendor, it’s ..

Read more ›

What is Web Application Penetration Testing?

Is your company in the process of developing a new application? There are a lot of moving parts involved in developing and deploying cutting-edge appl..

Read more ›
tech-texture-bg