Wednesday, June 19, 2024

Renowned Hacker Kevin Mitnick Died at the Age of 59

In an unfortunate turn of events, the computer hacker from the 1990s, who was involved in high-profile cases of computer data theft and credit card number stealing, passed away due to pancreatic cancer.

When he was 16 years old, Mitnick started his career as a hacker by accessing unsecured networks without authorization.

In the 1980s, he set his sights on Digital Equipment Corporation’s computer system as his first target.

He was given a one-year jail term, followed by three years of supervised release by the court.

Unfortunately, he was apprehended again for hacking Pacific Bell’s voicemail systems towards the end of his previous release. This led to a warrant being issued for his arrest.

Hacking into cell phones and illegally copying software led to many prison terms for Mitnick, including eight months in solitary confinement.

In January 2000, Kevin completed his last prison sentence, which he jokingly referred to as a ‘vacation.’

Following this experience, he underwent a transformation and embarked on a new career path as a White Hat hacker and security consultant.

Kevin Mitnick later became a security evangelist and ‘Chief Hacking Officer’ at KnowBe4. Also, he wrote the following books with William L. Simon:

  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
  • The Art of Deception
  • The Art of Invisibility

He has taught Social Engineering to hundreds of businesses and government organizations, conducted penetration tests for some of the top firms in the world, and provided security consultancy for the Fortune 500.

Throughout his career, he has appeared as a special guest on a wide variety of radio and television shows, where he has provided insightful analysis on topics concerning information security.

In April, he unveiled a powerful password-cracking tool.


Latest articles

Amtrak Data Breach: Hackers Accessed User’s Email Address

Amtrak notified its customers regarding a significant security breach involving its Amtrak Guest Rewards...

Chrome Security Update – Patch for 6 Vulnerabilities

Google has announced a new update for the Chrome browser, rolling out version 126.0.6478.114/115...

Hackers Weaponize Windows Installer (MSI) Files to Deliver Malware

Cybersecurity researchers have uncovered a sophisticated malware campaign orchestrated by a threat actor group,...

Hackers Using VPNs To Exploit Restrictions & Steal Mobile Data

Hackers are offering "free" mobile data access on Telegram channels by exploiting loopholes in...

New PhaaS Platform Lets Attackers Bypass Two-Factor Authentication

Several phishing campaign kits have been used widely by threat actors in the past....

Stuxnet, The Malware That Propagates To Air-Gapped Networks

Stuxnet, a complex worm discovered in 2010, targeted Supervisory Control and Data Acquisition (SCADA)...

Threat Actors Claiming Breach of AMD Source Code on Hacking Forums

A threat actor named " IntelBroker " claims to have breached AMD in June...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles