-
Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.
-
I was an accomplished computer trespasser. I don't consider myself a thief.
-
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
-
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.
-
I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case.
-
So the ethic I was taught in school resulted in the path I chose in my life following school.
-
It's kind of interesting, because hacking is a skill that could be used for criminal purposes or legitimate purposes, and so even though in the past I was hacking for the curiosity, and the thrill, to get a bite of the forbidden fruit of knowledge, I'm now working in the security field as a public speaker.
-
Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.
-
Nine out of every 10 large corporations and government agencies have been attacked by computer intruders.
-
Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984.
-
Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.
-
I get hired to hack into computers now and sometimes it's actually easier than it was years ago.
-
To some people I'll always be the bad guy.
-
The hacker mindset doesn't actually see what happens on the other side, to the victim.
-
Hacking is exploiting security controls either in a technical, physical or a human-based element.
-
Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws.
-
Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management.
-
I happen to be notorious. That, I have no control over.
-
At the end of the day, my goal was to be the best hacker.
-
What I found personally to be true was that it's easier to manipulate people rather than technology.
-
So what I was essentially doing was, I compromised the confidentiality of their proprietary software to advance my agenda of becoming the best at breaking through the lock.
-
My primary goal of hacking was the intellectual curiosity, the seduction of adventure.
-
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
-
It's actually a smarter crime because imagine if you rob a bank, or you're dealing drugs. If you get caught you're going to spend a lot of time in custody. But with hacking, it's much easier to commit the crime and the risk of punishment is slim to none.