Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" To some people I'll always be the bad guy. "
Kevin Mitnick
Always
Some People
Bad
Related Quotes:
" Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically. "
Kevin Mitnick
Computers
You
Personal
" Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against. "
Kevin Mitnick
Difficult
Key
Against
" Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker. "
Kevin Mitnick
Action
Organization
Influence
" It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills. "
Kevin Mitnick
Skill
Computers
People
" Usually companies hire me, and they know full well who I am, and that's one of the reasons they want to hire me. "
Kevin Mitnick
I Am
Well
Want
" I saw myself as an electronic joy rider. "
Kevin Mitnick
Myself
Rider
Saw
" A log-in simulator is a program to trick some unknowing user into providing their user name and password. "
Kevin Mitnick
Some
Program
Trick
" I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company. "
Kevin Mitnick
Hacker
Better
Control
" Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate. "
Kevin Mitnick
Social
Used
Hybrid
" I happen to be notorious. That, I have no control over. "
Kevin Mitnick
Control
Happen
Notorious
" Once when I was a fugitive, I was working for a law firm in Denver. "
Kevin Mitnick
Once
Law
Firm
" Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon. "
Kevin Mitnick
Details
Numbers
Important
" If I needed to know about a security exploit, I preferred to get the information by accessing the companies' security teams' files, rather than poring over lines of code to find it on my own. It's just more efficient. "
Kevin Mitnick
Own
Security
Know
" If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk. "
Kevin Mitnick
People
Risk
Circle
" I did get a huge endorphin rush when I was able to crack a system because it was like a video game. "
Kevin Mitnick
Like
Because
Crack
" Protecting yourself is very challenging in the hostile environment of the Internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses and exploit them to gain access to your most sensitive secrets. "
Kevin Mitnick
Internet
Environment
Yourself
" Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis. "
Kevin Mitnick
Proactive
People
Thinking
" I was hooked in before hacking was even illegal. "
Kevin Mitnick
Hooked
Even
Hacking
" I characterize myself as a retired hacker. I'm applying what I know to improve security at companies. "
Kevin Mitnick
Security
Know
Improve
" I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. "
Kevin Mitnick
Curiosity
Adventure
Challenge
" At the end of the day, my goal was to be the best hacker. "
Kevin Mitnick
Best
Day
End
" I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access. "
Kevin Mitnick
Engineers
Search
I Can
" A lot of individuals out there carry a lot of proprietary information on their mobile devices, and they're not protected. It's a very target-rich environment. "
Kevin Mitnick
Mobile
Information
Environment
" Should we fear hackers? Intention is at the heart of this discussion. "
Kevin Mitnick
Discussion
Intention
Heart
" Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted. "
Kevin Mitnick
Security
Innocent
Organization
" I could have evaded the FBI a lot longer if I had been able to control my passion for hacking. "
Kevin Mitnick
Passion
Hacking
FBI
" Not being allowed to use the Internet is kind of like not being allowed to use a telephone. "
Kevin Mitnick
Telephone
Being
Like
" You can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk. "
Kevin Mitnick
Possible
Never
You
" The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme. "
Kevin Mitnick
Enough
Government
Stupid
" Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties. "
Kevin Mitnick
Say
Results
Serious