Friday, November 27, 08:28
Home rapidshare EXCLUSIVE: Kevin Mitnick's interview with SecNews! Do not miss it!

EXCLUSIVE: Kevin Mitnick's interview with SecNews! Do not miss it!

Kevin Mitnick, the most famous hacker and social engineer of our time in an exclusive interview with SecNews!

The famous American hacker who has written history thanks to his hacking skills will speak for the first time in Greece for major Security Issues and hacking.

Stay tuned in SecNews TV to watch the interview of the best hacker of our time.

Few words about Kevin Mitnick ...

Kevin Mitnick is one of the most famous American hackers. Having invaded many telecommunication networks and stealing data from them, he was sentenced to jail for electronic crimes and possession of counterfeit data. Kevin Mitnick gained many supporters who believed that his punishment was excessive and considered him the greatest hacker of our time as well as the best social engineer.

Mitnick has written 3 books around the social engineering and security gaps in systems. It has founded it his own company which deals with network security issues (Mitnick Security Consulting). He also conducts security seminars for large companies in the field.

From the very first moment he came into contact with computers, and combining it his ability to Phreaking began to deal with obtaining remote access to computers. 1987 is captured for the first time for hacking. Next year, he was again charged with an invasion of the Digital Equipment Corporation stealing source code system and was sentenced to one year's imprisonment.

Kevin Mitnick from the time of his release and then continued to deal with hacking traveling to various states in America to avoid arresting again, using fake elements. It soon became the focus of the media but also of the media FBI. Eventually 1995 Kevin Mitnick was arrested and sentenced to 5 years in prison. When he was released, 2000 forbade him to use keypad devices for years.

Kevin Mitnick will talk to SecNews about both his life and theirs security risks that businesses and ordinary users face. As for them aspiring hackers of our company, Kevin has some tips to you.

 

Stay tuned!

1 COMMENT

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

00:02:04

The value of Bitcoin and other digital currencies fell

The value of Bitcoin and other digital currencies fell on November 25, which triggers scenarios regarding the duration of the explosion ...

Which are the countries with the most economical internet?

Although the Internet is available in almost every country in the world, the cost of subscription, speeds and salaries of citizens ...

How to choose which extensions will appear in the Firefox toolbar

If you are using extensions with Mozilla Firefox and want to add or remove some extension icons from the toolbar, you can ...

WhatsApp OTP Scam: steps to avoid hackers

WhatsApp is gaining more and more reputation as one of the most used mobile messaging applications worldwide, with more users ...

Sophos notifies some customers that their personal information has been exposed

The British cybersecurity and hardware company Sophos sent an email to some of its customers to inform them that their personal ...

A $ 6 million fine was imposed on Facebook for data sharing

Facebook has been fined 6,7 billion won (about $ 6 million) for sharing user data from Korea without ...

How to turn off "Blood Oxygen Monitoring" on the Apple Watch

Apple Watch Series 6 and newer versions come with "blood oxygen monitoring" function. It records even in the background the ...

Ransomware attack hits Baltimore school district!

The Baltimore School District was attacked by ransomware on Nov. 25 and shut down its affected network systems. THE...

Google Chrome: Execute commands via the address bar

Google has released a new feature in Google Chrome 87 that lets you run commands from the address bar.

Belden: Network device maker under cyber attack!

The manufacturer of network devices "Belden" was attacked by cyber, as a result of which the hackers behind it stole files containing information ...