Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" So what I was essentially doing was, I compromised the confidentiality of their proprietary software to advance my agenda of becoming the best at breaking through the lock. "
Kevin Mitnick
Through
Lock
Software
Related Quotes:
" Sometimes I get a call from my bank, and the first thing they ask is, 'Mr. Mitnick, may I get your account number?' And I'll say, 'You called me! I'm not giving you my account number!' "
Kevin Mitnick
You
Bank
Giving
" I have done a lot to rehabilitate my reputation. "
Kevin Mitnick
Lot
Reputation
Done
" I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company. "
Kevin Mitnick
Hacker
Better
Control
" I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all the trouble I was getting into, because I was hooked. "
Kevin Mitnick
Technology
Me
Hacking
" I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast. "
Kevin Mitnick
Joy
Like
Myself
" Of course I'm sure half the people there hate me and half the people like me. "
Kevin Mitnick
Half
Hate
Sure
" A hacker doesn't deliberately destroy data or profit from his activities. "
Kevin Mitnick
His
Data
Hacker
" To some people I'll always be the bad guy. "
Kevin Mitnick
Always
Some People
Bad
" The first programming assignment I had in high school was to find the first 100 Fibonacci numbers. Instead, I thought it would be cooler to write a program to get the teacher's password and all the other students' passwords. And the teacher gave me an A and told the class how smart I was. "
Kevin Mitnick
Thought
Me
School
" I use Mac. Not because it's more secure than everything else - because it is actually less secure than Windows - but I use it because it is still under the radar. People who write malicious code want the greatest return on their investment, so they target Windows systems. I still work with Windows in virtual machines. "
Kevin Mitnick
Investment
Work
Windows
" Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis. "
Kevin Mitnick
Proactive
People
Thinking
" Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. "
Kevin Mitnick
Legal
Actions
Degree
" I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me. "
Kevin Mitnick
Credit
Me
Trust
" It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker. "
Kevin Mitnick
Security
True
Better
" Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted. "
Kevin Mitnick
Security
Innocent
Organization
" Nine out of every 10 large corporations and government agencies have been attacked by computer intruders. "
Kevin Mitnick
Been
Out
Corporations
" Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business. "
Kevin Mitnick
Big
Business
Curiosity
" Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon. "
Kevin Mitnick
Details
Numbers
Important
" The hacker mindset doesn't actually see what happens on the other side, to the victim. "
Kevin Mitnick
Hacker
Victim
Side
" Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees. "
Kevin Mitnick
Phone
You
Explore
" A lot of individuals out there carry a lot of proprietary information on their mobile devices, and they're not protected. It's a very target-rich environment. "
Kevin Mitnick
Mobile
Information
Environment
" Usually companies hire me, and they know full well who I am, and that's one of the reasons they want to hire me. "
Kevin Mitnick
I Am
Well
Want
" Back in my day, I would probe by hand. Now you can get commercial software that does the job for you. "
Kevin Mitnick
Now
Job
Back
" I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case. "
Kevin Mitnick
Where
Computer
Case
" It doesn't work the same way everywhere. The Americans are the most gullible, because they don't like to deny co-workers' requests. People in the former Soviet bloc countries are less trusting, perhaps because of their previous experiences with their countries' secret services. "
Kevin Mitnick
Co-Workers
Work
Way
" If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk. "
Kevin Mitnick
People
Risk
Circle
" My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime. "
Kevin Mitnick
Crime
Punishment
Argument
" I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access. "
Kevin Mitnick
Engineers
Search
I Can
" Once when I was a fugitive, I was working for a law firm in Denver. "
Kevin Mitnick
Once
Law
Firm
" To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks. "
Kevin Mitnick
Mistake
Credit
Web