Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis. "
Kevin Mitnick
Proactive
People
Thinking
Related Quotes:
" If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk. "
Kevin Mitnick
People
Risk
Circle
" Once when I was a fugitive, I was working for a law firm in Denver. "
Kevin Mitnick
Once
Law
Firm
" I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me. "
Kevin Mitnick
Credit
Me
Trust
" I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. "
Kevin Mitnick
Curiosity
Adventure
Challenge
" Back in my day, I would probe by hand. Now you can get commercial software that does the job for you. "
Kevin Mitnick
Now
Job
Back
" I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case. "
Kevin Mitnick
Where
Computer
Case
" When I read about myself in the media, even I don't recognize me. The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care. "
Kevin Mitnick
More
Media
Care
" At the end of the day, my goal was to be the best hacker. "
Kevin Mitnick
Best
Day
End
" Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against. "
Kevin Mitnick
Difficult
Key
Against
" I have done a lot to rehabilitate my reputation. "
Kevin Mitnick
Lot
Reputation
Done
" Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail. "
Kevin Mitnick
Human
Engineering
Deception
" There's a feature on Facebook where you can enable security that checks the device you're coming from. By default these features are likely off, but as a consumer, you can enable them. "
Kevin Mitnick
Facebook
Off
You
" I think malware is a significant threat because the mitigation, like antivirus software, hasn't evolved to a point to really mitigate the risk to a reasonable degree. "
Kevin Mitnick
Think
Risk
Point
" I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government. "
Kevin Mitnick
Magic
Hacker
Government
" I saw myself as an electronic joy rider. "
Kevin Mitnick
Myself
Rider
Saw
" I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything. "
Kevin Mitnick
Me
Myself
Support
" Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business. "
Kevin Mitnick
Big
Business
Curiosity
" Think about it: if you were running a multi-million dollar company, and your database of customer information was stolen, would you want to tell your clients? No. Most companies did not until the laws required them to. It's in the best interest of organisations - when they're attacked and information is stolen - to tell nobody. "
Kevin Mitnick
Best
Information
Customer
" It's actually a smarter crime because imagine if you rob a bank, or you're dealing drugs. If you get caught you're going to spend a lot of time in custody. But with hacking, it's much easier to commit the crime and the risk of punishment is slim to none. "
Kevin Mitnick
Risk
Punishment
Time
" My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime. "
Kevin Mitnick
Crime
Punishment
Argument
" The first programming assignment I had in high school was to find the first 100 Fibonacci numbers. Instead, I thought it would be cooler to write a program to get the teacher's password and all the other students' passwords. And the teacher gave me an A and told the class how smart I was. "
Kevin Mitnick
Thought
Me
School
" I wasn't a hacker for the money, and it wasn't to cause damage. "
Kevin Mitnick
Damage
Cause
Hacker
" I could pose as a Yahoo rep claiming that there's been some sort of fault, and somebody else is getting your e-mail, and we're going to have to remove your account and reinstall it. So what we'll do is reset the current password that you have - and by the way, what is it? "
Kevin Mitnick
Going
Way
You
" I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company. "
Kevin Mitnick
Hacker
Better
Control
" Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes. "
Kevin Mitnick
You
Data
Back
" What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. But those things can be exploited. "
Kevin Mitnick
Cards
Stronger
Smart
" Protecting yourself is very challenging in the hostile environment of the Internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses and exploit them to gain access to your most sensitive secrets. "
Kevin Mitnick
Internet
Environment
Yourself
" Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees. "
Kevin Mitnick
Phone
You
Explore
" People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures. "
Kevin Mitnick
Information
People
Nice
" I was pretty much the government's poster boy for what I had done. "
Kevin Mitnick
Boy
Government
Much