Cyber Security Articles & News

LISTEN: Infamous Hacker Kevin Mitnick Tells Us How He Created Fake Identities

Once arrested by the FBI, Mitnick tells us how to keep information private online.

Radio Motherboard sits down with infamous hacker and computer security expert Kevin Mitnick—aka The Condor—to discuss internet safety, online privacy, and the art of hacking.

A longtime code breaker and hacker, Mitnick was arrested in 1995 by the FBI for a laundry list of crimes, including gaining unauthorized access to dozens of computer networks and hacking into private emails and databases. The case was highly publicized and sparked a national conversation around cyber crime, becoming one of the first major controversies of the digital age.

Mitnick is now a consultant and author, and travels the country giving lectures on cyber security. In this episode we talked to him about his illustrious and oftentimes dangerous career as a hacker, which started at the age of 13 and culminated in his dramatic '95 arrest. We also touch on the pressingly urgent themes in his new book, The Art of Invisibility, exploring the notions of safety and privacy in an increasingly invasive digital landscape.

As a hacker and now as a security consultant, Mitnick has worked both inside and outside of the system, studying our online framework from angles that the average internet user cannot possibly access. He had some wisdom to share with us about keeping our information private online.

Listen to this cool radio program here: https://motherboard.vice.com/en_us/article/d38mjz/infamous-hacker-kevin-mitnick-tells-us-how-he-created-fake-identities 

Source: Radio Motherboard

Topics: The Art of Invisibility, virtual machines, CFAA, cloudbleed, encryption, cyber law, fake identities, FBI, hacking, keynote speaker, online privacy, phone phreaking, internet safety, Apple, cell phone source codes, Cloud Flare Data Leak, cyber crime, cyber exploitation, heartbleed, iOS, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What is a Penetration Testing Framework?

Penetration testing services are performed by cybersecurity companies to help find weaknesses in an organization's network, internal systems, and show..

Read more ›

What To Expect During Red Team Operations

Companies are producing an exponential amount of data every day and by 2025, it’s estimated that there will be about 181 zettabytes of data. As your o..

Read more ›

4 Considerations When Choosing Between Pentesting Companies

As business models continue to evolve the need for cybersecurity measures is more necessary than ever before.

Read more ›
tech-texture-bg