Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case. "
Kevin Mitnick
Where
Computer
Case
Related Quotes:
" I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it? "
Kevin Mitnick
Security
Why
Phone
" I was an accomplished computer trespasser. I don't consider myself a thief. "
Kevin Mitnick
Accomplished
Thief
Myself
" If I needed to know about a security exploit, I preferred to get the information by accessing the companies' security teams' files, rather than poring over lines of code to find it on my own. It's just more efficient. "
Kevin Mitnick
Own
Security
Know
" I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company. "
Kevin Mitnick
Hacker
Better
Control
" I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government. "
Kevin Mitnick
Magic
Hacker
Government
" I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast. "
Kevin Mitnick
Joy
Like
Myself
" I saw myself as an electronic joy rider. "
Kevin Mitnick
Myself
Rider
Saw
" I started with CB radio, ham radio, and eventually went into computers. And I was just fascinated with it. And back then, when I was in school, computer hacking was encouraged. It was an encouraged activity. In fact, I remember one of the projects my teacher gave me was writing a log-in simulator. "
Kevin Mitnick
School
Me
Computers
" Usually companies hire me, and they know full well who I am, and that's one of the reasons they want to hire me. "
Kevin Mitnick
I Am
Well
Want
" A hacker doesn't deliberately destroy data or profit from his activities. "
Kevin Mitnick
His
Data
Hacker
" Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information. "
Kevin Mitnick
People
Security
Information
" We have problems with our physical security, operational security through to management. "
Kevin Mitnick
Through
Management
Problems
" You can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk. "
Kevin Mitnick
Possible
Never
You
" Think about it: if you were running a multi-million dollar company, and your database of customer information was stolen, would you want to tell your clients? No. Most companies did not until the laws required them to. It's in the best interest of organisations - when they're attacked and information is stolen - to tell nobody. "
Kevin Mitnick
Best
Information
Customer
" I think malware is a significant threat because the mitigation, like antivirus software, hasn't evolved to a point to really mitigate the risk to a reasonable degree. "
Kevin Mitnick
Think
Risk
Point
" I made stupid decisions as a kid, or as a young adult, but I'm trying to be now, I'm trying to take this lemon and make lemonade. "
Kevin Mitnick
Young
Now
Stupid
" Some people think technology has the answers. "
Kevin Mitnick
Think
People
Some People
" I characterize myself as a retired hacker. I'm applying what I know to improve security at companies. "
Kevin Mitnick
Security
Know
Improve
" If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk. "
Kevin Mitnick
People
Risk
Circle
" I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control. "
Kevin Mitnick
Short
Enough
Control
" Sometimes I get a call from my bank, and the first thing they ask is, 'Mr. Mitnick, may I get your account number?' And I'll say, 'You called me! I'm not giving you my account number!' "
Kevin Mitnick
You
Bank
Giving
" No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems. "
Kevin Mitnick
Way
Break
Government
" The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care. "
Kevin Mitnick
Care
Interesting
Reality
" I'm not a fugitive anymore. Never will be in the future. After spending five years in jail, you learn your lesson. I never want to return there. "
Kevin Mitnick
Future
Jail
Learn
" Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management. "
Kevin Mitnick
Day
People
Management
" I love solving puzzles, I love finding my way around obstacles, and I love learning new things about technology. "
Kevin Mitnick
Learning
Technology
Obstacles
" Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders. "
Kevin Mitnick
Human
Human Nature
Nature
" When an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find. "
Kevin Mitnick
Key
Hacker
Find
" I could pose as a Yahoo rep claiming that there's been some sort of fault, and somebody else is getting your e-mail, and we're going to have to remove your account and reinstall it. So what we'll do is reset the current password that you have - and by the way, what is it? "
Kevin Mitnick
Going
Way
You
" No company that I ever hacked into reported any damages, which they were required to do for significant losses. "
Kevin Mitnick
Any
Losses
Company