Kevin Mitnick Quotes

Most memorable quotes from Kevin Mitnick.

Kevin Mitnick Famous Quotes

Reading Kevin Mitnick quotes, download and share images of famous quotes by Kevin Mitnick. Righ click to see or save pictures of Kevin Mitnick quotes that you can use as your wallpaper for free.

I use Spam Arrest because of the amount of junk mail I get. Any legitimate person who wants to send me a message has to jump through hoops before they can be added to my opt-in list.
Kevin Mitnick Quotes: I use Spam Arrest because
It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.
Kevin Mitnick Quotes: It's true, I had hacked
I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me.
Kevin Mitnick Quotes: I trust online banking. You
The hacking trend has definitely turned criminal because of e-commerce.
Kevin Mitnick Quotes: The hacking trend has definitely
Think about it: if you were running a multi-million dollar company, and your database of customer information was stolen, would you want to tell your clients? No. Most companies did not until the laws required them to. It's in the best interest of organisations - when they're attacked and information is stolen - to tell nobody.
Kevin Mitnick Quotes: Think about it: if you
The hacker mindset doesn't actually see what happens on the other side, to the victim.
Kevin Mitnick Quotes: The hacker mindset doesn't actually
So what I was essentially doing was, I compromised the confidentiality of their proprietary software to advance my agenda of becoming the best at breaking through the lock.
Kevin Mitnick Quotes: So what I was essentially
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A.
Kevin Mitnick Quotes: I think it goes back
The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications.
Kevin Mitnick Quotes: The Patriot Act is ludicrous.
No company that I ever hacked into reported any damages, which they were required to do for significant losses.
Kevin Mitnick Quotes: No company that I ever
Usually companies hire me, and they know full well who I am, and that's one of the reasons they want to hire me.
Kevin Mitnick Quotes: Usually companies hire me, and
I saw myself as an electronic joy rider.
Kevin Mitnick Quotes: I saw myself as an
Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information.
Kevin Mitnick Quotes: Companies spend millions of dollars
Hacking is exploiting security controls either in a technical, physical or a human-based element.
Kevin Mitnick Quotes: Hacking is exploiting security controls
I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case.
Kevin Mitnick Quotes: I don't know of any
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
Kevin Mitnick Quotes: The key to social engineering
I happen to be notorious. That, I have no control over.
Kevin Mitnick Quotes: I happen to be notorious.
As a young boy, I was taught in high school that hacking was cool.
Kevin Mitnick Quotes: As a young boy, I
Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted.
Kevin Mitnick Quotes: Penetrating a company's security often
Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes.
Kevin Mitnick Quotes: Back up everything! You are
So the ethic I was taught in school resulted in the path I chose in my life following school.
Kevin Mitnick Quotes: So the ethic I was
What I found personally to be true was that it's easier to manipulate people rather than technology.
Kevin Mitnick Quotes: What I found personally to
We have problems with our physical security, operational security through to management.
Kevin Mitnick Quotes: We have problems with our
I did get a huge endorphin rush when I was able to crack a system because it was like a video game.
Kevin Mitnick Quotes: I did get a huge
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
Kevin Mitnick Quotes: Hackers are breaking the systems
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon.
Kevin Mitnick Quotes: Garbage can provide important details
But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it's still a hard sell for people.
Kevin Mitnick Quotes: But a lot of businesses
I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company.
Kevin Mitnick Quotes: I was fascinated with the
Back in my day, I would probe by hand. Now you can get commercial software that does the job for you.
Kevin Mitnick Quotes: Back in my day, I
Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984.
Kevin Mitnick Quotes: Steve Wozniak and Steve Jobs
I use Mac. Not because it's more secure than everything else - because it is actually less secure than Windows - but I use it because it is still under the radar. People who write malicious code want the greatest return on their investment, so they target Windows systems. I still work with Windows in virtual machines.
Kevin Mitnick Quotes: I use Mac. Not because
Social engineering bypasses all technologies, including firewalls.
Kevin Mitnick Quotes: Social engineering bypasses all technologies,
Our Constitution requires that the accused be presumed innocent before trial, thus granting all citizens the right to a bail hearing, where the accused has the opportunity to be represented by counsel, present evidence, and cross-examine witnesses.
Kevin Mitnick Quotes: Our Constitution requires that the
When an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find.
Kevin Mitnick Quotes: When an attacker fails with
I could pose as a Yahoo rep claiming that there's been some sort of fault, and somebody else is getting your e-mail, and we're going to have to remove your account and reinstall it. So what we'll do is reset the current password that you have - and by the way, what is it?
Kevin Mitnick Quotes: I could pose as a
The intent of the individuals who created the DDoS attacks has nothing to do with hacking, and they are vandals, not hackers.
Kevin Mitnick Quotes: The intent of the individuals
Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.
Kevin Mitnick Quotes: Computer hacking really results in
Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.
Kevin Mitnick Quotes: Are hackers a threat? The
My hacking was all about becoming the best at circumventing security. So when I was a fugitive, I worked systems administrator jobs to make money. I wasn't stealing money or using other people's credit cards. I was doing a 9-to-5 job.
Kevin Mitnick Quotes: My hacking was all about
Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management.
Kevin Mitnick Quotes: Security is always going to
The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president!
Kevin Mitnick Quotes: The explosion of companies deploying
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.
Kevin Mitnick Quotes: Most people assume that once
Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.
Kevin Mitnick Quotes: Hackers are becoming more sophisticated
I was hooked in before hacking was even illegal.
Kevin Mitnick Quotes: I was hooked in before
My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime.
Kevin Mitnick Quotes: My argument is not that
To some people I'll always be the bad guy.
Kevin Mitnick Quotes: To some people I'll always
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
Kevin Mitnick Quotes: Use a personal firewall. Configure
I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.
Kevin Mitnick Quotes: I don't condone anyone causing
Choosing a hard-to-guess, but easy-to-remember password is important!
Kevin Mitnick Quotes: Choosing a hard-to-guess, but easy-to-remember
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks.
Kevin Mitnick Quotes: To have transactions made on
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail.
Kevin Mitnick Quotes: Social engineering is using deception,
Not being allowed to use the Internet is kind of like not being allowed to use a telephone.
Kevin Mitnick Quotes: Not being allowed to use
Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn't have enough space on my 200 megabyte hard drive.
Kevin Mitnick Quotes: Any type of operating system
A hacker doesn't deliberately destroy data or profit from his activities.
Kevin Mitnick Quotes: A hacker doesn't deliberately destroy
A log-in simulator is a program to trick some unknowing user into providing their user name and password.
Kevin Mitnick Quotes: A log-in simulator is a
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.
Kevin Mitnick Quotes: A company can spend hundreds
I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we've always found a hole.
Kevin Mitnick Quotes: I get hired by companies
If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk.
Kevin Mitnick Quotes: If hackers, if anyone committing
Once when I was a fugitive, I was working for a law firm in Denver.
Kevin Mitnick Quotes: Once when I was a
All they need to do is to set up some website somewhere selling some bogus product at twenty percent of the normal market prices and people are going to be tricked into providing their credit card numbers.
Kevin Mitnick Quotes: All they need to do
The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme.
Kevin Mitnick Quotes: The government does things like
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else.
Kevin Mitnick Quotes: Somebody could send you an
I wasn't a hacker for the money, and it wasn't to cause damage.
Kevin Mitnick Quotes: I wasn't a hacker for
One of my all-time favorite pranks was gaining unauthorized access to the telephone switch and changing the class of service of a fellow phone phreak. When he'd attempt to make a call from home, he'd get a message telling him to deposit a dime, because the telephone company switch received input that indicated he was calling from a pay phone.
Kevin Mitnick Quotes: One of my all-time favorite
I was an accomplished computer trespasser. I don't consider myself a thief. I copied without permission.
Kevin Mitnick Quotes: I was an accomplished computer
A lot of individuals out there carry a lot of proprietary information on their mobile devices, and they're not protected. It's a very target-rich environment.
Kevin Mitnick Quotes: A lot of individuals out
Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.
Kevin Mitnick Quotes: Social engineering is using manipulation,
I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access.
Kevin Mitnick Quotes: I can go into LinkedIn
Protecting yourself is very challenging in the hostile environment of the Internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses and exploit them to gain access to your most sensitive secrets.
Kevin Mitnick Quotes: Protecting yourself is very challenging
You can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk.
Kevin Mitnick Quotes: You can never protect yourself
When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no.
Kevin Mitnick Quotes: When somebody asks for a
Sometimes I get a call from my bank, and the first thing they ask is, 'Mr. Mitnick, may I get your account number?' And I'll say, 'You called me! I'm not giving you my account number!'
Kevin Mitnick Quotes: Sometimes I get a call
The Americans are the most gullible, because they don't like to deny co-workers' requests.
Kevin Mitnick Quotes: The Americans are the most
Some people think technology has the answers.
Kevin Mitnick Quotes: Some people think technology has
Businesses should absolutely set aside funding in their budgets for security consultants. Unless there is an expert on staff, and there usually is not, it needs to be outsourced.
Kevin Mitnick Quotes: Businesses should absolutely set aside
Of course I'm sure half the people there hate me and half the people like me.
Kevin Mitnick Quotes: Of course I'm sure half
I think a cyber-terrorism attack is overblown, though the threat exists. I think al Qaeda and other groups are more interested in symbolic terrorism, like what they did to the World Trade Center - suicide bombers or something that really has an effect and is meaningful to people.
Kevin Mitnick Quotes: I think a cyber-terrorism attack
I'm not a fugitive anymore. Never will be in the future. After spending five years in jail, you learn your lesson. I never want to return there.
Kevin Mitnick Quotes: I'm not a fugitive anymore.
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
Kevin Mitnick Quotes: I characterize myself as a
My primary goal of hacking was the intellectual curiosity, the seduction of adventure.
Kevin Mitnick Quotes: My primary goal of hacking
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.
Kevin Mitnick Quotes: My hacking involved pretty much
It's kind of interesting, because hacking is a skill that could be used for criminal purposes or legitimate purposes, and so even though in the past I was hacking for the curiosity, and the thrill, to get a bite of the forbidden fruit of knowledge, I'm now working in the security field as a public speaker.
Kevin Mitnick Quotes: It's kind of interesting, because
People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures.
Kevin Mitnick Quotes: People are prone to taking
Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees.
Kevin Mitnick Quotes: Phone phreaking is a type
The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
Kevin Mitnick Quotes: The myth of Kevin Mitnick
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
Kevin Mitnick Quotes: I'm still a hacker. I
I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all the trouble I was getting into, because I was hooked.
Kevin Mitnick Quotes: I got so passionate about
The human. Now you know all about your target
Kevin Mitnick Quotes: The human. Now you know
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
Kevin Mitnick Quotes: Most of the computer compromises
I made stupid decisions as a kid, or as a young adult, but I'm trying to be now, I'm trying to take this lemon and make lemonade.
Kevin Mitnick Quotes: I made stupid decisions as
I think malware is a significant threat because the mitigation, like antivirus software, hasn't evolved to a point to really mitigate the risk to a reasonable degree.
Kevin Mitnick Quotes: I think malware is a
When I was in prison, a Colombian drug lord, offered me $5 million in cash to manipulate a computer system so that he would be released. I turned him down.
Kevin Mitnick Quotes: When I was in prison,
I get hired to hack into computers now and sometimes it's actually easier than it was years ago.
Kevin Mitnick Quotes: I get hired to hack
Kevin Mitchell Quotes «
» Kevin Moccia Quotes