Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
All Quotes by author - Kevin Mitnick
" A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted. "
Company
Technology
Security
" A hacker doesn't deliberately destroy data or profit from his activities. "
His
Data
Hacker
" All they need to do is to set up some website somewhere selling some bogus product at twenty percent of the normal market prices and people are going to be tricked into providing their credit card numbers. "
Need
Website
Credit
" A log-in simulator is a program to trick some unknowing user into providing their user name and password. "
Some
Program
Trick
" A lot of companies are clueless, because they spend most or all of their security budget on high-tech security like fire walls and biometric authentication - which are important and needed - but then they don't train their people. "
Important
Fire
Train
" A lot of individuals out there carry a lot of proprietary information on their mobile devices, and they're not protected. It's a very target-rich environment. "
Mobile
Information
Environment
" Anything out there is vulnerable to attack given enough time and resources. "
Enough
Time
Attack
" Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn't have enough space on my 200 megabyte hard drive. "
Hard
University
Space
" Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. "
Legal
Actions
Degree
" As a young boy, I was taught in high school that hacking was cool. "
Boy
Young
School
" At the end of the day, my goal was to be the best hacker. "
Best
Day
End
" Back in my day, I would probe by hand. Now you can get commercial software that does the job for you. "
Now
Job
Back
" Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes. "
You
Data
Back
" Being on the run wasn't fun, but it was something I had to do. I was actually working in legitimate jobs. I wasn't living on people's credit cards. I was living like a character out of a movie. It was performance art. "
Performance
People
Art
" Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate. "
Social
Used
Hybrid
" Businesses should absolutely set aside funding in their budgets for security consultants. Unless there is an expert on staff, and there usually is not, it needs to be outsourced. "
Expert
Needs
Funding
" But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it's still a hard sell for people. "
Investment
See
Look
" Choosing a hard-to-guess, but easy-to-remember password is important! "
Important
Choosing
" Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information. "
People
Security
Information
" Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties. "
Say
Results
Serious
" For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me. "
Thought
Time
Story
" For the average home-user, anti-virus software is a must. A personal firewall such as Zone Alarm and running a program like HFNetcheck, which is a free download for personal users. It checks your system to see if anything needs to be patched. I'd also recommend a program such as SpyCop to periodically check for any spyware on your system. "
Free
Average
Personal
" Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon. "
Details
Numbers
Important
" Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders. "
Human
Human Nature
Nature
" Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business. "
Big
Business
Curiosity
" Hacking is exploiting security controls either in a technical, physical or a human-based element. "
Physical
Technical
Hacking
" Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking. "
Passion
Real
Mind
" I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control. "
Short
Enough
Control
" I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access. "
Engineers
Search
I Can
" I characterize myself as a retired hacker. I'm applying what I know to improve security at companies. "
Security
Know
Improve
Check our other websites:
BookDark
MusicDark