Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" A lot of individuals out there carry a lot of proprietary information on their mobile devices, and they're not protected. It's a very target-rich environment. "
Kevin Mitnick
Mobile
Information
Environment
Related Quotes:
" Choosing a hard-to-guess, but easy-to-remember password is important! "
Kevin Mitnick
Important
Choosing
" My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims. "
Kevin Mitnick
Actions
Pure
Government
" I'm an expert witness in a case that's in appeal about a guy who allegedly misappropriated source code from a major, major company - he actually worked there and then apparently they found it on his laptop later. "
Kevin Mitnick
Witness
Guy
Source
" One of my all-time favorite pranks was gaining unauthorized access to the telephone switch and changing the class of service of a fellow phone phreak. When he'd attempt to make a call from home, he'd get a message telling him to deposit a dime, because the telephone company switch received input that indicated he was calling from a pay phone. "
Kevin Mitnick
Class
Company
Home
" Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms. "
Kevin Mitnick
Hacker
Become
Security
" Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees. "
Kevin Mitnick
Phone
You
Explore
" When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no. "
Kevin Mitnick
You
Identity
Information
" If you go to a coffee shop or at the airport, and you're using open wireless, I would use a VPN service that you could subscribe for 10 bucks a month. Everything is encrypted in an encryption tunnel, so a hacker cannot tamper with your connection. "
Kevin Mitnick
You
Service
Hacker
" Should we fear hackers? Intention is at the heart of this discussion. "
Kevin Mitnick
Discussion
Intention
Heart
" My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems. "
Kevin Mitnick
I Can
Security
Exploring
" The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president! "
Kevin Mitnick
Parking
Hacker
Creating
" I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. "
Kevin Mitnick
Curiosity
Adventure
Challenge
" For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me. "
Kevin Mitnick
Thought
Time
Story
" The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard for other people to guess. "
Kevin Mitnick
People
Life
Perfect
" Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else. "
Kevin Mitnick
People
Control
Management
" Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management. "
Kevin Mitnick
Day
People
Management
" I wasn't a hacker for the money, and it wasn't to cause damage. "
Kevin Mitnick
Damage
Cause
Hacker
" No company that I ever hacked into reported any damages, which they were required to do for significant losses. "
Kevin Mitnick
Any
Losses
Company
" My primary goal of hacking was the intellectual curiosity, the seduction of adventure. "
Kevin Mitnick
Adventure
Curiosity
Goal
" Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker. "
Kevin Mitnick
Action
Organization
Influence
" For the average home-user, anti-virus software is a must. A personal firewall such as Zone Alarm and running a program like HFNetcheck, which is a free download for personal users. It checks your system to see if anything needs to be patched. I'd also recommend a program such as SpyCop to periodically check for any spyware on your system. "
Kevin Mitnick
Free
Average
Personal
" It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker. "
Kevin Mitnick
Security
True
Better
" I love solving puzzles, I love finding my way around obstacles, and I love learning new things about technology. "
Kevin Mitnick
Learning
Technology
Obstacles
" The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications. "
Kevin Mitnick
Government
Everyone
Patriot
" I think malware is a significant threat because the mitigation, like antivirus software, hasn't evolved to a point to really mitigate the risk to a reasonable degree. "
Kevin Mitnick
Think
Risk
Point
" I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization. "
Kevin Mitnick
Hacking
Hacker
Never
" The Internet is like the phone. To be without it is ridiculous. "
Kevin Mitnick
Ridiculous
Internet
Without
" I did get a huge endorphin rush when I was able to crack a system because it was like a video game. "
Kevin Mitnick
Like
Because
Crack
" Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon. "
Kevin Mitnick
Details
Numbers
Important
" Hacking is exploiting security controls either in a technical, physical or a human-based element. "
Kevin Mitnick
Physical
Technical
Hacking