Watch on

Tech Tonic : World renowned hacker Kevin Mitnick hacks my voicemail to demonstrate how News of the World reporters may have done so.


‘Use VPN!’ Former 'Most Wanted Hacker’ Mitnick talks Snowden, NSA, privacy

Kevin Mitnick: Ghost in the Wires (by tsevis)

A mosaic for the cover of “Ghost in the Wires”, the latest book by the legendary hacker Kevin Mitnick.
More about the book here.
You can buy it here.

Best viewed large.
Attention: Big file. (6144 x 6144 pixels = 20.5" x 20.5" @ 300 ppi)
Alternately you can zoom in to the high res (38 megapixels) file with Microsoft ZoomIt.

Made with custom developed scripts, hacks and lots of love, using my Mac, Studio Artist, the Adobe Creative Suite and good music. Licensed under the Creative Commons License Scheme. You can use this image for NON commercial projects, but you have to credit me. Please, don’t use it to express hate, racism or anything negative. See all of my photomosaic works.
Many thanks to Julianna Lee at Little, Brown and Co. (Hachette Book Group)
Here is the actual book cover. Designerd by Julianna Lee.

Some details:
NY TIMES: "For those interested in computer history, 'Ghost in the Wires' is a nostalgia trip to the quaint old days before hacking (and hackers) turned so malicious and financially motivated. Unlike computer criminals today, (hacker Kevin) Mitnick ignored the credit card numbers he stumbled across in his pursuit of code. He writes: 'Anyone who loves to play chess knows that it’s enough to defeat your opponent. You don’t have to loot his kingdom or seize his assets to make it worthwhile.' He summed up his personal motive to the former Wall Street trader Ivan Boesky when they were both in prison: 'I didn’t do it for the money; I did it for the ­entertainment.'"
Watch on

Tech Tonic: My Reuters video interview with former most-wanted hacking in the world now most-wanted computer security consultant, Kevin Mitnick.

Watch on

How to hack like a News of the World reporter (3:10) via Reuters

World renowned computer hacker, Kevin Mitnick, shows you step-by-step how the News of the World journalists hacked into private voicemails.

What is left out by this piece is about pin codes - most people don’t or haven’t bothered changing the codes and use default. When they do, though, they usually use something personally familiar, such as birthday numbers. So codes could potentially be related to some other piece of personal information

Cyberpunk Term of the Week 12/24

Social Engineer

Meaning: Popularized by Cybergod Kevin Mitnick, it’s basically spying in a technological fashion. You become, through fraud and trickery, exactly the type of person over the phone or computer that they would give the information you need to. It usually involves setting up the situation or occupation they would tell the information to, or tricking them into accessing the information you need while you’re able to view what they’re doing in some way. It can range from simple to complicated, from simply placing a phone call to an unaware person to forging an entirely checkable identity with all the documents invovled to prove you’re who you say you are.