Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" Anything out there is vulnerable to attack given enough time and resources. "
Kevin Mitnick
Enough
Time
Attack
Related Quotes:
" I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access. "
Kevin Mitnick
Engineers
Search
I Can
" People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures. "
Kevin Mitnick
Information
People
Nice
" Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking. "
Kevin Mitnick
Passion
Real
Mind
" My hacking was all about becoming the best at circumventing security. So when I was a fugitive, I worked systems administrator jobs to make money. I wasn't stealing money or using other people's credit cards. I was doing a 9-to-5 job. "
Kevin Mitnick
Money
People
Security
" A log-in simulator is a program to trick some unknowing user into providing their user name and password. "
Kevin Mitnick
Some
Program
Trick
" A hacker doesn't deliberately destroy data or profit from his activities. "
Kevin Mitnick
His
Data
Hacker
" The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard for other people to guess. "
Kevin Mitnick
People
Life
Perfect
" Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else. "
Kevin Mitnick
People
Control
Management
" Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes. "
Kevin Mitnick
You
Data
Back
" When an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find. "
Kevin Mitnick
Key
Hacker
Find
" I was pretty much the government's poster boy for what I had done. "
Kevin Mitnick
Boy
Government
Much
" I could have evaded the FBI a lot longer if I had been able to control my passion for hacking. "
Kevin Mitnick
Passion
Hacking
FBI
" Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders. "
Kevin Mitnick
Human
Human Nature
Nature
" Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail. "
Kevin Mitnick
Human
Engineering
Deception
" There's a feature on Facebook where you can enable security that checks the device you're coming from. By default these features are likely off, but as a consumer, you can enable them. "
Kevin Mitnick
Facebook
Off
You
" I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast. "
Kevin Mitnick
Joy
Like
Myself
" The hacking trend has definitely turned criminal because of e-commerce. "
Kevin Mitnick
Hacking
Criminal
Because
" Should we fear hackers? Intention is at the heart of this discussion. "
Kevin Mitnick
Discussion
Intention
Heart
" Our Constitution requires that the accused be presumed innocent before trial, thus granting all citizens the right to a bail hearing, where the accused has the opportunity to be represented by counsel, present evidence, and cross-examine witnesses. "
Kevin Mitnick
Opportunity
Innocent
Constitution
" I made stupid decisions as a kid, or as a young adult, but I'm trying to be now, I'm trying to take this lemon and make lemonade. "
Kevin Mitnick
Young
Now
Stupid
" For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me. "
Kevin Mitnick
Thought
Time
Story
" I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control. "
Kevin Mitnick
Short
Enough
Control
" Businesses should absolutely set aside funding in their budgets for security consultants. Unless there is an expert on staff, and there usually is not, it needs to be outsourced. "
Kevin Mitnick
Expert
Needs
Funding
" The best thing to do is always keep randomly generated passwords everywhere and use a password tool to manage it, and then you don't have to remember those passwords at all, just the master password that unlocks the database. "
Kevin Mitnick
Best
Remember
Master
" Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984. "
Kevin Mitnick
Ear
Computers
Set
" No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems. "
Kevin Mitnick
Way
Break
Government
" A lot of individuals out there carry a lot of proprietary information on their mobile devices, and they're not protected. It's a very target-rich environment. "
Kevin Mitnick
Mobile
Information
Environment
" You can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk. "
Kevin Mitnick
Possible
Never
You
" When I read about myself in the media, even I don't recognize me. The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care. "
Kevin Mitnick
More
Media
Care
" It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills. "
Kevin Mitnick
Skill
Computers
People