Kevin Mitnick

Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
access computer defend extremely key spear technique
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
providing trick
A log-in simulator is a program to trick some unknowing user into providing their user name and password.
given time vulnerable
Anything out there is vulnerable to attack given enough time and resources.
I have done a lot to rehabilitate my reputation.
electronic james saw
I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast.
I was an accomplished computer trespasser. I don't consider myself a thief.
hacking hooked
I was hooked in before hacking was even illegal.
Not being allowed to use the Internet is kind of like not being allowed to use a telephone.
The Internet is like the phone. To be without it is ridiculous.
asks favor involving somebody verify
When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no.
certain companies found kid phone quite throughout united
I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it?
businesses deployed detection devices happens products secure site smaller standard stronger system
What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. But those things can be exploited.
companies needed spend train walls
A lot of companies are clueless, because they spend most or all of their security budget on high-tech security like fire walls and biometric authentication - which are important and needed - but then they don't train their people.
computer computers encouraged eventually fascinated gave hacking ham projects teacher
I started with CB radio, ham radio, and eventually went into computers. And I was just fascinated with it. And back then, when I was in school, computer hacking was encouraged. It was an encouraged activity. In fact, I remember one of the projects my teacher gave me was writing a log-in simulator.