-
Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.
Kevin Mitnick -
I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.
Kevin Mitnick
-
I wasn't a hacker for the money, and it wasn't to cause damage.
Kevin Mitnick -
A lot of individuals out there carry a lot of proprietary information on their mobile devices, and they're not protected. It's a very target-rich environment.
Kevin Mitnick -
The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
Kevin Mitnick -
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else.
Kevin Mitnick -
Usually companies hire me, and they know full well who I am, and that's one of the reasons they want to hire me.
Kevin Mitnick -
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
Kevin Mitnick
-
The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme.
Kevin Mitnick -
Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.
Kevin Mitnick -
There's a feature on Facebook where you can enable security that checks the device you're coming from. By default these features are likely off, but as a consumer, you can enable them.
Kevin Mitnick -
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
Kevin Mitnick -
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks.
Kevin Mitnick -
Of course I'm sure half the people there hate me and half the people like me.
Kevin Mitnick
-
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.
Kevin Mitnick -
I keep my stuff updated all the time. Being in the security industry, I keep up to date with securities.
Kevin Mitnick -
For the average home-user, anti-virus software is a must.
Kevin Mitnick -
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing.
Kevin Mitnick -
I was an accomplished computer trespasser. I don't consider myself a thief. I copied without permission.
Kevin Mitnick -
I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we've always found a hole.
Kevin Mitnick
-
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems.
Kevin Mitnick -
Not being allowed to use the Internet is kind of like not being allowed to use a telephone.
Kevin Mitnick -
I think malware is a significant threat because the mitigation, like antivirus software, hasn't evolved to a point to really mitigate the risk to a reasonable degree.
Kevin Mitnick -
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail.
Kevin Mitnick