Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" Of course I'm sure half the people there hate me and half the people like me. "
Kevin Mitnick
Half
Hate
Sure
Related Quotes:
" Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against. "
Kevin Mitnick
Difficult
Key
Against
" Nine out of every 10 large corporations and government agencies have been attacked by computer intruders. "
Kevin Mitnick
Been
Out
Corporations
" I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast. "
Kevin Mitnick
Joy
Like
Myself
" We have problems with our physical security, operational security through to management. "
Kevin Mitnick
Through
Management
Problems
" If you go to a coffee shop or at the airport, and you're using open wireless, I would use a VPN service that you could subscribe for 10 bucks a month. Everything is encrypted in an encryption tunnel, so a hacker cannot tamper with your connection. "
Kevin Mitnick
You
Service
Hacker
" The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme. "
Kevin Mitnick
Enough
Government
Stupid
" The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications. "
Kevin Mitnick
Government
Everyone
Patriot
" I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me. "
Kevin Mitnick
Credit
Me
Trust
" I'm an expert witness in a case that's in appeal about a guy who allegedly misappropriated source code from a major, major company - he actually worked there and then apparently they found it on his laptop later. "
Kevin Mitnick
Witness
Guy
Source
" No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems. "
Kevin Mitnick
Way
Break
Government
" Some people think technology has the answers. "
Kevin Mitnick
Think
People
Some People
" A lot of individuals out there carry a lot of proprietary information on their mobile devices, and they're not protected. It's a very target-rich environment. "
Kevin Mitnick
Mobile
Information
Environment
" Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information. "
Kevin Mitnick
People
Security
Information
" My primary goal of hacking was the intellectual curiosity, the seduction of adventure. "
Kevin Mitnick
Adventure
Curiosity
Goal
" I was pretty much the government's poster boy for what I had done. "
Kevin Mitnick
Boy
Government
Much
" Protecting yourself is very challenging in the hostile environment of the Internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses and exploit them to gain access to your most sensitive secrets. "
Kevin Mitnick
Internet
Environment
Yourself
" A lot of companies are clueless, because they spend most or all of their security budget on high-tech security like fire walls and biometric authentication - which are important and needed - but then they don't train their people. "
Kevin Mitnick
Important
Fire
Train
" At the end of the day, my goal was to be the best hacker. "
Kevin Mitnick
Best
Day
End
" My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime. "
Kevin Mitnick
Crime
Punishment
Argument
" Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984. "
Kevin Mitnick
Ear
Computers
Set
" Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms. "
Kevin Mitnick
Hacker
Become
Security
" Once when I was a fugitive, I was working for a law firm in Denver. "
Kevin Mitnick
Once
Law
Firm
" I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything. "
Kevin Mitnick
Me
Myself
Support
" What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. But those things can be exploited. "
Kevin Mitnick
Cards
Stronger
Smart
" I started with CB radio, ham radio, and eventually went into computers. And I was just fascinated with it. And back then, when I was in school, computer hacking was encouraged. It was an encouraged activity. In fact, I remember one of the projects my teacher gave me was writing a log-in simulator. "
Kevin Mitnick
School
Me
Computers
" But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it's still a hard sell for people. "
Kevin Mitnick
Investment
See
Look
" I love solving puzzles, I love finding my way around obstacles, and I love learning new things about technology. "
Kevin Mitnick
Learning
Technology
Obstacles
" I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A. "
Kevin Mitnick
School
Teacher
Think
" Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management. "
Kevin Mitnick
Day
People
Management
" Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. "
Kevin Mitnick
Legal
Actions
Degree