Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" I keep my stuff updated all the time. Being in the security industry, I keep up to date with securities. "
Kevin Mitnick
Up
Time
Security
Related Quotes:
" I made stupid decisions as a kid, or as a young adult, but I'm trying to be now, I'm trying to take this lemon and make lemonade. "
Kevin Mitnick
Young
Now
Stupid
" Not being allowed to use the Internet is kind of like not being allowed to use a telephone. "
Kevin Mitnick
Telephone
Being
Like
" What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. But those things can be exploited. "
Kevin Mitnick
Cards
Stronger
Smart
" I saw myself as an electronic joy rider. "
Kevin Mitnick
Myself
Rider
Saw
" Our Constitution requires that the accused be presumed innocent before trial, thus granting all citizens the right to a bail hearing, where the accused has the opportunity to be represented by counsel, present evidence, and cross-examine witnesses. "
Kevin Mitnick
Opportunity
Innocent
Constitution
" Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management. "
Kevin Mitnick
Day
People
Management
" Back in my day, I would probe by hand. Now you can get commercial software that does the job for you. "
Kevin Mitnick
Now
Job
Back
" All they need to do is to set up some website somewhere selling some bogus product at twenty percent of the normal market prices and people are going to be tricked into providing their credit card numbers. "
Kevin Mitnick
Need
Website
Credit
" I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case. "
Kevin Mitnick
Where
Computer
Case
" At the end of the day, my goal was to be the best hacker. "
Kevin Mitnick
Best
Day
End
" The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president! "
Kevin Mitnick
Parking
Hacker
Creating
" Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted. "
Kevin Mitnick
Security
Innocent
Organization
" Nine out of every 10 large corporations and government agencies have been attacked by computer intruders. "
Kevin Mitnick
Been
Out
Corporations
" A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted. "
Kevin Mitnick
Company
Technology
Security
" I wasn't a hacker for the money, and it wasn't to cause damage. "
Kevin Mitnick
Damage
Cause
Hacker
" For the average home-user, anti-virus software is a must. A personal firewall such as Zone Alarm and running a program like HFNetcheck, which is a free download for personal users. It checks your system to see if anything needs to be patched. I'd also recommend a program such as SpyCop to periodically check for any spyware on your system. "
Kevin Mitnick
Free
Average
Personal
" I have done a lot to rehabilitate my reputation. "
Kevin Mitnick
Lot
Reputation
Done
" To some people I'll always be the bad guy. "
Kevin Mitnick
Always
Some People
Bad
" When an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find. "
Kevin Mitnick
Key
Hacker
Find
" It doesn't work the same way everywhere. The Americans are the most gullible, because they don't like to deny co-workers' requests. People in the former Soviet bloc countries are less trusting, perhaps because of their previous experiences with their countries' secret services. "
Kevin Mitnick
Co-Workers
Work
Way
" No company that I ever hacked into reported any damages, which they were required to do for significant losses. "
Kevin Mitnick
Any
Losses
Company
" For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me. "
Kevin Mitnick
Thought
Time
Story
" Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms. "
Kevin Mitnick
Hacker
Become
Security
" The first programming assignment I had in high school was to find the first 100 Fibonacci numbers. Instead, I thought it would be cooler to write a program to get the teacher's password and all the other students' passwords. And the teacher gave me an A and told the class how smart I was. "
Kevin Mitnick
Thought
Me
School
" I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we've always found a hole. "
Kevin Mitnick
Security
Break
Always
" It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker. "
Kevin Mitnick
Security
True
Better
" Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon. "
Kevin Mitnick
Details
Numbers
Important
" My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems. "
Kevin Mitnick
I Can
Security
Exploring
" Think about it: if you were running a multi-million dollar company, and your database of customer information was stolen, would you want to tell your clients? No. Most companies did not until the laws required them to. It's in the best interest of organisations - when they're attacked and information is stolen - to tell nobody. "
Kevin Mitnick
Best
Information
Customer
" I get hired to hack into computers now and sometimes it's actually easier than it was years ago. "
Kevin Mitnick
Computers
Years
Sometimes