The story behind the world's most wanted hacker

Kevin Mitnick is an American computer security consultant, author, and convicted hacker, we look at his high profile arrest and subsequent rise to fame.

Kevin Mitnick's ‘electronic joyride’ made him part of the FBI’s most wanted list for hacking into more than 40 major corporations in the 1990s. Mitnick gained access to the computers and networks of the world's biggest companies while eluding the authorities through phone switches, computer systems and cellular networks. For three years he went on the run, using false identities and escaping from city to city until a final showdown with the Feds, who would stop at nothing to bring him down. 

After a well-publicised pursuit, the FBI arrested Mitnick in 1995 on federal offenses related to a two and half year period of computer hacking. Mitnick was charged with wire fraud, possession of unauthorised access devices, interception of wire or electronic communications, unauthorised access to a federal computer, and causing damage to a computer. Mitnick served five years in prison and was released on January 21, 2000. 

Mitnick's creativity, skills and persistence forced the authorities to rethink the way they pursued hackers. Those ripples brought permanent changes to the way companies and people protect their most sensitive information. His story became legendary and is the basis for many books, articles, films and TV programmes.

Today, Mitnick is a trusted security consultant to the Fortune 500 and governments worldwide. As the CEO of Mitnick Security Consulting, Kevin, and The Global Ghost Team™ now maintain a 100 percent successful track record in their ability to penetrate the security of any system they’re paid to hack, using a combination of technical exploits and social engineering. 

In his role as Chief Hacking Officer of KnowBe4 he endorses and helps produce the world's #1 security awareness training and platform to train employees to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.

 

 

 

Share

Featured Articles

BlueVoyant's Tom Moore Talks Legal Procedure Following Hack

BlueVoyant's Tom Moore explains how companies should act with legal council following a cyber attack

GDPR: Studying the World's Strictest Security Law 6 Years On

We take a look at the history, impact, and future of GDPR to see how it has effected the cyber sphere six years after its enactment

Banking Titan Baird Gives 9 Pointers for Cyber Investors

Investment bank Baird have made nine observations from RSA Conference that investors should consider when investing in today’s cyber market

OpenText's Pillr Buy Show Acquisitions Still in its Strategy

Cyber Security

Zoom Prepares for Quantum World with Post-Quantum Encryption

Cyber Security

Tenable: Security Expertise Gap Threatening Cloud Expansion

Operational Security