Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" Sometimes I get a call from my bank, and the first thing they ask is, 'Mr. Mitnick, may I get your account number?' And I'll say, 'You called me! I'm not giving you my account number!' "
Kevin Mitnick
You
Bank
Giving
Related Quotes:
" The hacker mindset doesn't actually see what happens on the other side, to the victim. "
Kevin Mitnick
Hacker
Victim
Side
" What I found personally to be true was that it's easier to manipulate people rather than technology. "
Kevin Mitnick
Be True
True
Technology
" People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures. "
Kevin Mitnick
Information
People
Nice
" Back in my day, I would probe by hand. Now you can get commercial software that does the job for you. "
Kevin Mitnick
Now
Job
Back
" Businesses should absolutely set aside funding in their budgets for security consultants. Unless there is an expert on staff, and there usually is not, it needs to be outsourced. "
Kevin Mitnick
Expert
Needs
Funding
" Choosing a hard-to-guess, but easy-to-remember password is important! "
Kevin Mitnick
Important
Choosing
" As a young boy, I was taught in high school that hacking was cool. "
Kevin Mitnick
Boy
Young
School
" The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network. "
Kevin Mitnick
Engineering
Key
Information
" Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees. "
Kevin Mitnick
Phone
You
Explore
" Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically. "
Kevin Mitnick
Computers
You
Personal
" I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it? "
Kevin Mitnick
Security
Why
Phone
" Think about it: if you were running a multi-million dollar company, and your database of customer information was stolen, would you want to tell your clients? No. Most companies did not until the laws required them to. It's in the best interest of organisations - when they're attacked and information is stolen - to tell nobody. "
Kevin Mitnick
Best
Information
Customer
" Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted. "
Kevin Mitnick
Security
Innocent
Organization
" Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management. "
Kevin Mitnick
Day
People
Management
" When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no. "
Kevin Mitnick
You
Identity
Information
" Some people think technology has the answers. "
Kevin Mitnick
Think
People
Some People
" I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access. "
Kevin Mitnick
Engineers
Search
I Can
" Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business. "
Kevin Mitnick
Big
Business
Curiosity
" Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. "
Kevin Mitnick
Legal
Actions
Degree
" Not being allowed to use the Internet is kind of like not being allowed to use a telephone. "
Kevin Mitnick
Telephone
Being
Like
" Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information. "
Kevin Mitnick
People
Security
Information
" I saw myself as an electronic joy rider. "
Kevin Mitnick
Myself
Rider
Saw
" I characterize myself as a retired hacker. I'm applying what I know to improve security at companies. "
Kevin Mitnick
Security
Know
Improve
" Nine out of every 10 large corporations and government agencies have been attacked by computer intruders. "
Kevin Mitnick
Been
Out
Corporations
" The first programming assignment I had in high school was to find the first 100 Fibonacci numbers. Instead, I thought it would be cooler to write a program to get the teacher's password and all the other students' passwords. And the teacher gave me an A and told the class how smart I was. "
Kevin Mitnick
Thought
Me
School
" Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties. "
Kevin Mitnick
Say
Results
Serious
" I think a cyber-terrorism attack is overblown, though the threat exists. I think al Qaeda and other groups are more interested in symbolic terrorism, like what they did to the World Trade Center - suicide bombers or something that really has an effect and is meaningful to people. "
Kevin Mitnick
Suicide
World
Think
" I'm not a fugitive anymore. Never will be in the future. After spending five years in jail, you learn your lesson. I never want to return there. "
Kevin Mitnick
Future
Jail
Learn
" I use Mac. Not because it's more secure than everything else - because it is actually less secure than Windows - but I use it because it is still under the radar. People who write malicious code want the greatest return on their investment, so they target Windows systems. I still work with Windows in virtual machines. "
Kevin Mitnick
Investment
Work
Windows
" So the ethic I was taught in school resulted in the path I chose in my life following school. "
Kevin Mitnick
Taught
Life
My Life