Kevin Mitnick
Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
games able cracks
I did get a huge endorphin rush when I was able to crack a system because it was like a video game.
boys government done
I was pretty much the government's poster boy for what I had done.
rights target lists
I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access.
jobs apples ears
Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984.
people giving looks
But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it's still a hard sell for people.
believe damage-control enough-time
I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control.
writing adventure challenges
I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses.
joy saws riders
I saw myself as an electronic joy rider.
hackers company retired
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
home average viruses
For the average home-user, anti-virus software is a must.
cat swings games
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing.
government hacking action
My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims.
numbers people needs
All they need to do is to set up some website somewhere selling some bogus product at twenty percent of the normal market prices and people are going to be tricked into providing their credit card numbers.
garbage-cans names numbers
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon.