See your story in print! — even if you choose to use an alias and only your hacker friends know it’s you!
Publisher John Wiley & Sons has commissioned Kevin Mitnick to co-author his second book, telling the untold stories of computer hacking and social engineering into the most resilient organizations on the planet — corporations, and government and military installations.
Kevin is putting out a call to all current and former hackers to tell him about their sexiest hacks. He’s not looking for those who simply downloaded and used pre-packaged exploits, but hackers who have shown innovation and ingenuity to compromise their targets. The most desirable stories will be those that involved a combination of technical, physical and/or social engineering aspects. The more devious and cunning, the better.
If the story makes it into the book, the hacker will receive a free copy of Kevin’s first book, “The Art of Deception,” plus a rare Advanced Reader’s Copy of the new one with their story in it — both signed by Kevin with a personal inscription. There will be a $500.00 prize awarded to the person who comes forward with the most provocative story, based on attack methodologies and/or desirability of the target.
Kevin’s plea agreement restricts him from telling stories of his own hacks until January 2010, which is why he’s looking for stories from other hackers. He guarantees to absolutely protect hackers’ identities (remember, he did NOT cooperate with law enforcement during their prosecution of him). Unless hackers ask that their real name be used, Kevin will tell the story under an alias name of the hacker’s choice. Of course, he will have to somehow verify the accuracy of the story
prior to publishing it in the book.
The book, tentatively titled “The Art of Intrusion,” will reveal the true, untold stories of successful intrusions. Instead of relying on third-party information from uninformed sources, “The Art of Intrusion” will chronicle the “hack” as told by the perpetrators themselves. Readers will get an in-depth look into the thought processes that form the hacker mindset–why they do it, and how a plan is developed and executed to gain control of their victim’s network.
Each story told in the book will be followed by an in-depth analysis of the factors that contributed to the success of the security incident — by examining the specific vulnerabilities and how they were exploited.
While “The Art of Deception” focused on the weakest link of the security chain — the human element — “The Art of intrusion” will describe a variety of attacks that exploit weaknesses in every area of information security — physical, personnel, operations, network, and individual computer systems.
Hackers who would like to see their story in print should jot down a line or two about what they did and e-mail it to
Kevin Mitnick is the founder of Defensive Thinking, an information security firm, and speaks widely on security issues. He has appeared on 60 Minutes and elsewhere in the media, and his exploits have spawned several bestselling books, including The Fugitive Game.
Latest posts by Ramon Ray (see all)
- Accounting Gets Artificial Intelligence: Xero’s New Service - March 16, 2017
- 4 Tips for Staying Safe on a Public Computer - January 20, 2017
- 5 Tips To Choosing Your Marketing Automation Provider - December 16, 2016