Redhotcyber<p>Gli hacker più forti: la storia di Kevin Mitnick, detto il condor.</p><p>Kevin Mitnick è forse l’hacker più conosciuto di sempre.</p><p>E’ un <a href="https://mastodon.bida.im/tags/hacker" class="mention hashtag" rel="tag">#<span>hacker</span></a> americano, <a href="https://mastodon.bida.im/tags/consulente" class="mention hashtag" rel="tag">#<span>consulente</span></a> di <a href="https://mastodon.bida.im/tags/sicurezza" class="mention hashtag" rel="tag">#<span>sicurezza</span></a> IT, esperto di <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> etico, oratore pubblico e <a href="https://mastodon.bida.im/tags/scrittore" class="mention hashtag" rel="tag">#<span>scrittore</span></a>. Si tratta di una icona dell’hacking (sia black che white) riconosciuta in tutto il mondo, oltre ad essere l’autore di due libri di eccezione come “The Art of Deception” del 2003 e “The Art of Intrusion” del 2005.</p><p>Venne arrestato per aver violato la rete di computer della Digital Equipment Corporation (<a href="https://mastodon.bida.im/tags/DEC" class="mention hashtag" rel="tag">#<span>DEC</span></a>). Ma durante il suo rilascio in libertà vigilata, hackerò il sistema di posta vocale di <a href="https://mastodon.bida.im/tags/PacificBell" class="mention hashtag" rel="tag">#<span>PacificBell</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/hacker" class="mention hashtag" rel="tag">#<span>hacker</span></a> <a href="https://mastodon.bida.im/tags/cyberwar" class="mention hashtag" rel="tag">#<span>cyberwar</span></a> <a href="https://mastodon.bida.im/tags/infosec" class="mention hashtag" rel="tag">#<span>infosec</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a> <a href="https://mastodon.bida.im/tags/news" class="mention hashtag" rel="tag">#<span>news</span></a> <a href="https://mastodon.bida.im/tags/sicurezzainformatica" class="mention hashtag" rel="tag">#<span>sicurezzainformatica</span></a> <a href="https://mastodon.bida.im/tags/cybersec" class="mention hashtag" rel="tag">#<span>cybersec</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/minaccia" class="mention hashtag" rel="tag">#<span>minaccia</span></a> </p><p><a href="https://www.redhotcyber.com/post/il-condor-la-storia-di-kevin-mitnick" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/il-condor</span><span class="invisible">-la-storia-di-kevin-mitnick</span></a></p>