Tag Archive for: famed

Famed Hacker Unveils Wild Crack-In-The-Box Password Cracker Fueled By Dozens Of RTX 4090s


A password cracking setup outfitted with multiple graphics cards.

Kevin Mitnick, a former black hat hooligan-turned-good-guy who spent several years in prison in the 1990s for various computer-related tomfoolery, is showing off a beastly setup outfitted with 30 high-end GeForce graphics cards. We know what you’re wondering—can it run Crysis? It certainly has enough firepower to push pixels around like a schoolyard bully on steroids. But what his setup is really designed to do is to crack passwords with the same speed and ease it would take Hercules to crack a walnut.

Anyone who is not familiar with Mitnick can look him up on Google or visit the Wikipedia entry on him for a quick history lesson. His hacking days started in his pre-teen years and it only gets more interesting from there. The US Department of Justice and Federal Bureau of Investigation are certainly familiar with the man who is widely considered to be the world’s most famous hacker—he eluded both agencies for years…up until he didn’t.

A successful “Free Kevin” movement helped Mitnick earn an early release after spending more than five years behind bars. These days he spends his time as a highly sought-after security consultant. He’s also the chief executive officer at Mitnick Security Consulting, and chief hacking officer at KnowBe4, among other roles on his ever-expanding resume.

Kevin Mitnick tweet showing off his password cracking setup.

In posts shared to both Facebook and Twitter, Mitnick uploaded photos of a “badass password cracker” that the team at KnowBe4 helped him set up and configure. The beastly configuration is outfitted with two dozen of NVIDIA’s flagship consumer graphics cards, the GeForce RTX 4090 based on the Ada Lovelace GPU architecture, as well as six GeForce RTX 2080 cards based on Turing.

“This is what companies come up against when we are hired for Red Team engagements. Our team now has a new large group of GPUs to crack passwords much, much faster,” Mitnick explains.

In security parlance, a Red Team engagement is essentially a simulated cyberattack. You can think of it as an intense security audit. Exposing vulnerabilities is inevitably part of the process, but that’s not the main goal. These simulated attacks test a company’s ability to detect and respond to security threats.

This process is of course…

Source…

Twitter names famed hacker ‘Mudge’ as head of security


Peiter Zatko, widely known by his hacker handle Mudge has been given the position of Twitter's head of security

Peiter Zatko, widely known by his hacker handle Mudge has been given the position of Twitter’s head of security

Social media giant Twitter Inc, under increased threat of regulation and plagued by serious security breaches, is appointing one of the world’s best-regarded hackers to tackle everything from engineering missteps to misinformation.

The company on Monday named Peiter Zatko, widely known by his hacker handle Mudge, to the new position of head of security, giving him a broad mandate to recommend changes in structure and practices. Zatko answers to CEO Jack Dorsey and is expected to take over management of key security functions after a 45- to 60-day review.

In an exclusive interview, Zatko said he will examine ‘information security, site integrity, physical security, platform integrity — which starts to touch on abuse and manipulation of the platform — and engineering.’

Zatko most recently oversaw security at the electronic payments unicorn Stripe. Before that, he worked on special projects at Google and oversaw handing out grants for projects on cybersecurity at the Pentagon’s famed Defense Advanced Research and Projects Agency (DARPA).

Computer hackers from International;LOpht. a 'hacker think tank,' (left to right) Brian Oblivion,Tan,Kingpin,Mudge,Weld Pond,Space Rougue and Stefan Von Neumann testified in 1998 before the Senate Governmental Affairs hearing on government computer security

Computer hackers from International;LOpht. a ‘hacker think tank,’ (left to right) Brian Oblivion,Tan,Kingpin,Mudge,Weld Pond,Space Rougue and Stefan Von Neumann testified in 1998 before the Senate Governmental Affairs hearing on government computer security

Mudge is pictured testifying before the Senate Governmental Affairs hearing on government computer security in 1998

Mudge is pictured testifying before the Senate Governmental Affairs hearing on government computer security in 1998

Zatko’s colorful career began in the 1990s, when he simultaneously conducted classified work for a government contractor and was among the leaders of Cult of the Dead Cow, a hacking group notorious for releasing Windows hacking tools in order to goad Microsoft into improving security.

Zatko will answer directly to CEO Jack Dorsey and is expected to take over the management of key security functions

Zatko will answer directly to CEO Jack Dorsey and is expected to take over the management of key security functions

‘I don’t know if anyone can fix Twitter’s security, but he’d be at the top of my list,’ said Dan Kaufman, who supervised Zatko at DARPA and now leads the advanced products group at Google.

Stamos, who once worked for Zatko’s security consultancy, called him…

Source…

Famed iPhone hacker explains why FBI’s backdoor request is such a bad idea

When it comes to hacking the iPhone, it’s hard to find anyone with more experience breaking into Apple’s software than Will Strafach, aka Chronic. The legendary hacker has spent years reverse engineering each version of iOS to give jailbreakers full …
mac hacker – read more

NIH director Francis Collins receives award at White House – Staunton News Leader

WASHINGTON — Below the famed portraits of George and Martha Washington in the East Room of the White House, geneticist Francis Collins looked genuinely comfortable to be sharing a stage with some of America’s most brilliant scientific minds …

Read more