-
My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime.
Kevin Mitnick
-
I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses.
Kevin Mitnick
-
A log-in simulator is a program to trick some unknowing user into providing their user name and password.
Kevin Mitnick
-
There's a feature on Facebook where you can enable security that checks the device you're coming from. By default these features are likely off, but as a consumer, you can enable them.
Kevin Mitnick
-
The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme.
Kevin Mitnick
-
Not being allowed to use the Internet is kind of like not being allowed to use a telephone.
Kevin Mitnick
-
The best thing to do is always keep randomly generated passwords everywhere and use a password tool to manage it, and then you don't have to remember those passwords at all, just the master password that unlocks the database.
Kevin Mitnick
-
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems.
Kevin Mitnick
-
I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government.
Kevin Mitnick
-
As a young boy, I was taught in high school that hacking was cool.
Kevin Mitnick
-
Of course I'm sure half the people there hate me and half the people like me.
Kevin Mitnick
-
I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control.
Kevin Mitnick
-
We have problems with our physical security, operational security through to management.
Kevin Mitnick
-
Once when I was a fugitive, I was working for a law firm in Denver.
Kevin Mitnick
-
I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we've always found a hole.
Kevin Mitnick
-
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon.
Kevin Mitnick
-
You can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk.
Kevin Mitnick
-
I think malware is a significant threat because the mitigation, like antivirus software, hasn't evolved to a point to really mitigate the risk to a reasonable degree.
Kevin Mitnick
-
I keep my stuff updated all the time. Being in the security industry, I keep up to date with securities.
Kevin Mitnick
-
People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures.
Kevin Mitnick
-
I have done a lot to rehabilitate my reputation.
Kevin Mitnick
-
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A.
Kevin Mitnick
-
Our Constitution requires that the accused be presumed innocent before trial, thus granting all citizens the right to a bail hearing, where the accused has the opportunity to be represented by counsel, present evidence, and cross-examine witnesses.
Kevin Mitnick
-
No company that I ever hacked into reported any damages, which they were required to do for significant losses.
Kevin Mitnick
