Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Questions with Kevin Mitnick 5: Present-Day Hackers and Controversial Legislation

Final part of this interview is a Q&A section, where Kevin Mitnick answers viewer questions about his attitude to today’s hackers and other relevant matters. Shannon Morse: Well, Kevin, right now we are going to have some awesome viewer questions for you. Alright, so the first one comes from...

Questions with Kevin Mitnick 4: The Grey Hat Houdini of Hackers

Kevin Mitnick expresses his ideas on the state of security nowadays, discussing some real-world engagements he undertook and new projects coming up. Shannon Morse: Given that this book is kind of a look at your past days and hacking, is there anything you regret from the past days? Kevin Mitnick: Yeah, you...

Questions with Kevin Mitnick 3: Escaping Prosecution

In this part, the once most wanted hacker Kevin Mitnick tells Hak5’s Shannon Morse about his experience with the law enforcement when he was a fugitive. Shannon Morse: Speaking of people that you might have social-engineered, and same with the people that might have accused you of things: did you worry...

Questions with Kevin Mitnick 2: Social Engineering and Technical Hacks

This entry reflects autobiographic facts provided by Kevin Mitnick during his interview at Hak5, specifically outlining social engineering tricks he used. Shannon Morse: There were a whole lot of security flaws for a lot of corporates, a lot of companies that you write about in your book. Did you run into...

Questions with Kevin Mitnick

Interviewed by Hak5 tech show’s Shannon Morse, the legendary former hacker Kevin Mitnick unveils exciting facts of his intricate and captivating life story. Shannon Morse: Today I am so excited to have Kevin Mitnick in this studio. Now, Kevin, you are known as the world’s greatest, most wanted hacker....

History of Hacking 4: Real-World Phone Phreaking Stories

As a copestone of his talk, John Draper tells a few stories from his phone phreaking past to show the power you could have playing around with phone numbers. Okay, what I’d like to do now is tell a few stories about some of the stuff that we did, because I kind of wanted to save the best for last. One of...

History of Hacking 3: The Dawn of Computer Hacking

Reasons for phone phreaking effectiveness, as well as peculiarities and flaws of the first known online systems are what John Draper outlines in this part. Why Phone Phreaking Worked Well, AT&T’s decision to use what they called ‘in-band signaling’ was their downfall, very bad idea....

History of Hacking 2: Insight into Phone Phreaking

This part of John Draper’s presentation is about the various methods of phone phreaking as one of the early manifestations of hacking into systems. Phone Phreaking 101 Who is a phone phreak? A phone phreak is a person, usually blind, because the only things that are in their lives are audio and what they...

History of Hacking: John “Captain Crunch” Draper’s Perspective

Well-known old school hacker and phone phreak John “Captain Crunch” Draper delineates the major milestones in the evolution of different types of hacking at CONFidence IT security event. Hello everybody! I don’t know if you’ve heard of me or not, but I was the old school hacker back in the...

Pwned by the Owner 4: Lessons Learned

At the end of his fantastic Defcon talk, Andrew ‘Zoz’ Brooks takes some time to provide more details about the thief’s identity, and lists the lessons learned. Who is Melvin Guzman? The Close-Up Well, Melvin Guzman is the kind of person who spells his own name wrong on his Facebook page (see snapshot)....