Categories: cyber security

Renowned Hacker Kevin Mitnick Died at the Age of 59

In an unfortunate turn of events, the computer hacker from the 1990s, who was involved in high-profile cases of computer data theft and credit card number stealing, passed away due to pancreatic cancer.

When he was 16 years old, Mitnick started his career as a hacker by accessing unsecured networks without authorization.

In the 1980s, he set his sights on Digital Equipment Corporation’s computer system as his first target.

He was given a one-year jail term, followed by three years of supervised release by the court.

Unfortunately, he was apprehended again for hacking Pacific Bell’s voicemail systems towards the end of his previous release. This led to a warrant being issued for his arrest.

Hacking into cell phones and illegally copying software led to many prison terms for Mitnick, including eight months in solitary confinement.

In January 2000, Kevin completed his last prison sentence, which he jokingly referred to as a ‘vacation.’

Following this experience, he underwent a transformation and embarked on a new career path as a White Hat hacker and security consultant.

Kevin Mitnick later became a security evangelist and ‘Chief Hacking Officer’ at KnowBe4. Also, he wrote the following books with William L. Simon:

  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
  • The Art of Deception
  • The Art of Invisibility

He has taught Social Engineering to hundreds of businesses and government organizations, conducted penetration tests for some of the top firms in the world, and provided security consultancy for the Fortune 500.

Throughout his career, he has appeared as a special guest on a wide variety of radio and television shows, where he has provided insightful analysis on topics concerning information security.

In April, he unveiled a powerful password-cracking tool.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal…

4 hours ago

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting…

5 hours ago

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass…

5 hours ago

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message traffic,…

6 hours ago

Scattered Spider Launches Sophisticated Attacks to Steal Login Credentials and MFA Tokens

The cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as…

6 hours ago

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands

North Korean threat actors have demonstrated their adept use of social engineering techniques combined with…

6 hours ago