Kevin Mitnick, Hacker, “Most Wanted Computer Criminal” Turned Security Consultant, is Mac User

Saturday, September 19, 2009
By OP Editor

Kevin Mitnick was formerly the “most wanted” hacker. Now Mitnick is a Security consultant and Mac user, often seen with his Apple MacBook Pro.

Portrait of Kevin Mitnick, former hacker and most wanted computer criminal. Now security consultant.

Kevin Mitnick is an internationally renowned hacker / cracker.

Kevin gained unauthorized access to computer systems at some of the largest corporations on the planet and penetrated some of the most resilient computer systems ever developed.

While he was a fugitive, Mitnick listened on FBI phone calls, left them doughnuts when he narrowly escaped raids, and was chased down by a helicopter. Mitnick evaded capture for two and a half years.

Kevin Mitnick, Former Hacker, Wanted Poster from U.S. Marshals

At the time of his arrest, Kevin Mitnick was called by United States Department of Justice as “the most wanted computer criminal in United States history.”

Kevin Mitnick Mac

Mitnick now runs Mitnick Security Consulting, a computer security consultancy. Kevin Mitnick is seen here with his Apple MacBook Pro laptop.

December 2009 update: added watermark & second image of Kevin Mitnick with his Mac, because many sites stole the image without crediting this article. (If you like to repost the image, please do the right thing and credit this article. Thanks)

Kevin-Mitnick-Hacker-Security-Consultant-Mac-user-with-Apple-MacBook-Pro-laptop

Kevin Mitnick has been the subject of countless news and magazine articles published throughout the world.

Kevin Mitnick, Security Consultant, Lock Pick Metal Business Card

Books by Kevin Mitnick

Mitnick has written two books:
The Art of Deception: Controlling the Human Element of Security
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

He has made guest appearances on numerous television and radio programs on issues related to information security. Mitnick has even been a guest star on ABC’s spy drama “Alias,” playing a good CIA hacker.

Kevin Mitnick, security professional, wearing not a hacker t-shirt

Mitnick’s Alias appearance is on First season, Episode 5, “Alias” Doppelganger (2001). Scene with Mitnick is around 24 minutes in.

Kevin Mitnick, former hacker, Alias guest star appearance as CIA hacker

Alias is a great show that has won many awards. If you like action dramas like 24, you will like Alias.

Fun fact: At the time of recording the Alias episode, Kevin Mitnick was under court order that bans him from computer usage. So a dummy computer was used. The shots of the character with active computer screen were shot using a stunt double. Eventually Kevin Mitnick got his computer ban order removed through court.

Why Macs (Apple Computers) Are a Great Hacker’s Tool

  1. UNIX operating system: Apple Mac OS X is certified UNIX
  2. Macs can easily run multiple virtual machines under OS X without fear of infecting Mac OS X
  3. Efficient multi tasking under OS X allows running dozens of apps and numerous documents without slow downs
  4. Macs can easily multi-boot into different operating systems. Such as: Linux (UNIX variant), Microsoft Windows, Mac OS X (UNIX certified)
  5. No inexplicable slow downs, UNIX operating systems are designed for 24 / 7 operation

via:
Mitnick Security Consulting, LLC [Official Site]
Speaker: Kevin Mitnick [Global Speakers]
Social Engineering 101: Mitnick and other hackers show how it’s done [cnet]
Kevin Mitnick, most wanted computer criminal [US Department of Justice]

Related Stuff:
The Art of Deception: Controlling the Human Element of Security [Book by Kevin Mitnick]
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Alias (Award winning show)

Share

Related Posts

  1. Digg founder, entrepreneur Kevin Rose is a Mac user
  2. What Happens When You Steal a Hacker’s Mac
  3. Pwn2Own Hacking Contest Host, Security Conference CanSecWest Partly Microsoft Sponsored
  4. Apple Improves Firmware Security for MacBook Pro + MacBook Air
  5. Apple Security Update Adds Daily Check of Malicious Software + Removes MACDefender Trojan Malware

Tags: Apple, Entrepreneur, Industry Pioneer, Mac, MacBook Pro, Security, Technology

3 Responses to “Kevin Mitnick, Hacker, “Most Wanted Computer Criminal” Turned Security Consultant, is Mac User”

  1. WhiteSpirit

    Apple Mac OS X is not UNIX.
    Apple’s Mac OS X is the result of Aqua + Darwin.
    Darwin derives from FreeBSD userland, but with a mach microkernel.
    Apple derived the mach kernel while it was used for NeXT’s computer.
    Thus, Mac OS X is NOT UNIX, but UNIX-like.
    Certification means: http://www.opengroup.org/comm/press/19-2-nov07.htm

    The most direct descendent in lineage to the “grandfather” UNIX is Sun’s SunOS as a result of AT&T’s passing down System V release 4 to Sun back in the 80’s.

    1
  2. Atean

    .
    Damn… Owned.

    I bet you didnt see THAT coming, did you White Spirit?

    2

Site Search

iPad Air 2 Case

Popular Tags