Kevin Mitnick
![Kevin Mitnick](/assets/img/authors/kevin-mitnick.jpg)
Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
Kevin Mitnick quotes about
assume companies critical people proactive
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.
kevin
The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
agencies attacked government large nine
Nine out of every 10 large corporations and government agencies have been attacked by computer intruders.
accused bail citizens constitution opportunity requires thus
Our Constitution requires that the accused be presumed innocent before trial, thus granting all citizens the right to a bail hearing, where the accused has the opportunity to be represented by counsel, present evidence, and cross-examine witnesses.
computer computers encouraged eventually fascinated gave hacking ham projects teacher
I started with CB radio, ham radio, and eventually went into computers. And I was just fascinated with it. And back then, when I was in school, computer hacking was encouraged. It was an encouraged activity. In fact, I remember one of the projects my teacher gave me was writing a log-in simulator.
The Internet is like the phone. To be without it is ridiculous.
Not being allowed to use the Internet is kind of like not being allowed to use a telephone.
I was an accomplished computer trespasser. I don't consider myself a thief.
electronic james saw
I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast.
I have done a lot to rehabilitate my reputation.
given time vulnerable
Anything out there is vulnerable to attack given enough time and resources.
access computer defend extremely key spear technique
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
anybody anyone committing criminal greater higher involve obviously people reduce wants
If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk.
american-celebrity beating best case code enjoyed hacker security source
Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.