-
I keep my stuff updated all the time. Being in the security industry, I keep up to date with securities.
-
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail.
-
Not being allowed to use the Internet is kind of like not being allowed to use a telephone.
-
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems.
-
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.
-
I was an accomplished computer trespasser. I don't consider myself a thief. I copied without permission.
-
I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we've always found a hole.
-
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A.
-
The first programming assignment I had in high school was to find the first 100 Fibonacci numbers. Instead, I thought it would be cooler to write a program to get the teacher's password and all the other students' passwords. And the teacher gave me an A and told the class how smart I was.
-
For the average home-user, anti-virus software is a must.
-
No company that I ever hacked into reported any damages, which they were required to do for significant losses.
-
If I needed to know about a security exploit, I preferred to get the information by accessing the companies' security teams' files, rather than poring over lines of code to find it on my own. It's just more efficient.
-
I'm not a fugitive anymore. Never will be in the future. After spending five years in jail, you learn your lesson. I never want to return there.
-
But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it's still a hard sell for people.
-
My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime.
-
I was pretty much the government's poster boy for what I had done.
-
I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access.
-
I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses.
-
Our Constitution requires that the accused be presumed innocent before trial, thus granting all citizens the right to a bail hearing, where the accused has the opportunity to be represented by counsel, present evidence, and cross-examine witnesses.
-
I have done a lot to rehabilitate my reputation.
-
Once when I was a fugitive, I was working for a law firm in Denver.
-
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon.
-
When I read about myself in the media, even I don't recognize me. The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
-
I did get a huge endorphin rush when I was able to crack a system because it was like a video game.