SEE LIVE: Meet The World’s Most Famous Hacker: Kevin Mitnick

Kevin Mitnick is perhaps best known as the hacker who made it onto the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations.

Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five years in a federal prison, including a year in solitary confinement.

Read More >
Mitnick Talks Social Engineering and Attack Tactics

Breaches get worse and attacks keep happening, as threat actors have all of the capability thanks to user’s habits.

Speaking at Infosecurity North America in New York City, author, speaker and chief hacking officer of KnowBe4 Kevin Mitnick said that threat actors are able to collect information on their victims all too easily, and when evaluating a company it is also straight-forward to determine suppliers, customers, partners, vendors and employees to enable a social engineering exercise.

Read More »
NEW CARTOON: How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992

While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.

n 1992, Kevin Mitnick was on the run from the cops, one of the most wanted men in the United States, and certainly the most wanted hacker. He was living in Denver under a pseudonym, and was very worried about government surveillance.

Read More »
Social Engineering - From the Trojan Horse to Firewalls

Social Engineering is, without a doubt, the oldest computer hack. A loose term defining a range of hacks and scams, social engineering has persisted through countless centuries of human history. Simple in premise, difficult to defend against, and constantly evolving, social engineering represents one of the single greatest threats to information security in the history of technology.

It’s easy to forget that even the most secure firewall combined with the latest and greatest security software is still operated by a human being behind the keyboard. That extra-tight security is only as secure as the person operating the machine. This often presents the easiest method of entry into a secure system, as human beings are much easier to trick than machines.

Read More »
WATCH: Kevin Mitnick explains how hackers use social engineering to steal our data

The most famous world hacker Kevin Mitnick in an interview with BI Poland

during the Inside Trends conference explained how hackers use social engineering.

He also assessed, among others, how much banking systems are actually safe.

To view this video, please go to the source.

Read More »
Look after yourself, the hacker is watching!

Do you think that you are safe by entrusting data to Microsoft, Google or Apple? And logging in with two-step verification?

None of this, even there you can hack - claims the most famous hacker Kevin Mitnick.

Read More »
“On access and very pissed federal agents.” The most famous hacker in the world reveals the backstage of his work

Kevin Mitnick, a pseudonym of Condor, the most famous hacker in the world. INNPoland.pl is one of the few editors who managed to conduct an interview with a star in the cybersecurity industry

This is about a story about passion, unauthorized access and very pissed off federal agents - describes the biographer Kevin Mitnick, the world's most famous hacker. Suffice it to say that the man's antics in the late 1980s and early 1990s caused fears that Mitnick might break into NORAD and whistle to the phone to fire a nuclear attack. In an interview with INNPoland.pl, he reveals how he managed to make these spectacular burglaries.

Read More »
Handset would blow the atomic cell: We’ve slaughtered the most famous hacker

Kevin Mitnick's hobby took him behind bars.. Today he advises how to avoid the hacker he was himself.

(Editor's note: Translated from Polish using Google Translator)

He began by dabbing with a public transport system in Los Angeles to be able to ride a bus for free. Later, he went into the phone networks until he finally got to the list of the most sought-after men in the FBI - one of the most famous hackers in the world.

Read More »
WATCH THIS: Kevin Mitnick reveals three things that are the most vulnerable to hacker attacks

Video: Kevin Mitnick interviewed at Business Inside Trends convention  in Poland!

What makes Internet users vulnerable to hacker attacks? "It's malware, social engineering and using the same password," said Kevin Mitnick at the Business Insider Inside Trends conference. - These are the three most important issues - he stressed.

Read More »
The weakest link in safety is still man. Kevin Mitnick showed us how to outsmart us

Over the past 16 years, Kevin Mitnick's team of hackers broke into every company whose security he checked. - Those evil hackers are always looking for the weakest link in the security chain. In my opinion, most often these are people, not technology - said Mitnick on stage during the Business Insider Inside Trends conference at the Koneser Center in Prague. He showed that hackers are copying even the security cards of their victims during visits to office bathrooms.

Read More »