Saturday, March 2, 2024

Renowned Hacker Kevin Mitnick Died at the Age of 59

In an unfortunate turn of events, the computer hacker from the 1990s, who was involved in high-profile cases of computer data theft and credit card number stealing, passed away due to pancreatic cancer.

When he was 16 years old, Mitnick started his career as a hacker by accessing unsecured networks without authorization.

In the 1980s, he set his sights on Digital Equipment Corporation’s computer system as his first target.

He was given a one-year jail term, followed by three years of supervised release by the court.

Unfortunately, he was apprehended again for hacking Pacific Bell’s voicemail systems towards the end of his previous release. This led to a warrant being issued for his arrest.

Hacking into cell phones and illegally copying software led to many prison terms for Mitnick, including eight months in solitary confinement.

In January 2000, Kevin completed his last prison sentence, which he jokingly referred to as a ‘vacation.’

Following this experience, he underwent a transformation and embarked on a new career path as a White Hat hacker and security consultant.

Kevin Mitnick later became a security evangelist and ‘Chief Hacking Officer’ at KnowBe4. Also, he wrote the following books with William L. Simon:

  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
  • The Art of Deception
  • The Art of Invisibility

He has taught Social Engineering to hundreds of businesses and government organizations, conducted penetration tests for some of the top firms in the world, and provided security consultancy for the Fortune 500.

Throughout his career, he has appeared as a special guest on a wide variety of radio and television shows, where he has provided insightful analysis on topics concerning information security.

In April, he unveiled a powerful password-cracking tool.

Website

Latest articles

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles