Kevin Mitnick
![Kevin Mitnick](/assets/img/authors/kevin-mitnick.jpg)
Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
Kevin Mitnick quotes about
providing trick
A log-in simulator is a program to trick some unknowing user into providing their user name and password.
hacking hooked
I was hooked in before hacking was even illegal.
asks favor involving somebody verify
When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no.
certain companies found kid phone quite throughout united
I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it?
businesses deployed detection devices happens products secure site smaller standard stronger system
What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. But those things can be exploited.
companies needed spend train walls
A lot of companies are clueless, because they spend most or all of their security budget on high-tech security like fire walls and biometric authentication - which are important and needed - but then they don't train their people.
access computer environment exploit gain global hostile planet protecting sensitive side weaknesses
Protecting yourself is very challenging in the hostile environment of the Internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses and exploit them to gain access to your most sensitive secrets.
added amount arrest hoops junk legitimate send spam wants
I use Spam Arrest because of the amount of junk mail I get. Any legitimate person who wants to send me a message has to jump through hoops before they can be added to my opt-in list.
checks coming default device enable feature features likely
There's a feature on Facebook where you can enable security that checks the device you're coming from. By default these features are likely off, but as a consumer, you can enable them.
businesses immune passed site via web
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks.
evolved mitigate reasonable threat
I think malware is a significant threat because the mitigation, like antivirus software, hasn't evolved to a point to really mitigate the risk to a reasonable degree.
kevin myth recognize
When I read about myself in the media, even I don't recognize me. The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
bin exactly knew people portrayed side time
For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me.
assignment cooler gave high program school teacher
The first programming assignment I had in high school was to find the first 100 Fibonacci numbers. Instead, I thought it would be cooler to write a program to get the teacher's password and all the other students' passwords. And the teacher gave me an A and told the class how smart I was.