Kevin Mitnick

Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
controls either exploiting
Hacking is exploiting security controls either in a technical, physical or a human-based element.
act blank government hacks interested patriot proved spy subtle terrorists total wants
The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications.
allowed computers connect connecting net networks personal prevent programs sites
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
technology dollars encryption
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.
hacking bugs becoming
It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.
technology games video
I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all the trouble I was getting into, because I was hooked.
school boys hacking
As a young boy, I was taught in high school that hacking was cool.
technology engineering bypass
Social engineering bypasses all technologies, including firewalls.
stupidity patches
There is no patch for stupidity.
veils social cloaks
Social engineers veil themselves in a cloak of believability.
curiosity intellectual thrill
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
self risk degrees
You can never protect yourself 100%. What you do is protect your self as much as possible and mitigate risk to an acceptable degree. You can never remove all risk.
engineering keys information
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
years policies-and-procedures people
The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully.