Kevin Mitnick

Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
numbers perfect people
The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard for other people to guess.
loss damage sun
No company that I ever hacked into reported any damages, which they were required to do for significant losses. Sun didn't stop using Solaris and DEC didn't stop using VMS.
government way break
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems.
becoming-the-best locks agendas
So what I was essentially doing was, I compromised the confidentiality of their proprietary software to advance my agenda of becoming the best at breaking through the lock.
adventure goal curiosity
My primary goal of hacking was the intellectual curiosity, the seduction of adventure.
management problem physical-attraction
We have problems with our physical security, operational security through to management.
stupidity updates window
You can't go to Windows Update and get a patch for stupidity.
hacking hackers individual
The intent of the individuals who created the DDoS attacks has nothing to do with hacking, and they are vandals, not hackers.
writing people target
I use Mac. Not because it's more secure than everything else - because it is actually less secure than Windows - but I use it because it is still under the radar. People who write malicious code want the greatest return on their investment, so they target Windows systems. I still work with Windows in virtual machines.
rights target lists
I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access.
cat swings games
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing.
causes degrees action
Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.
punishment argument fit
My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime.
government hacking action
My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims.