Kevin Mitnick
Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
became control fascinated hacker phone system
I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company.
government hire programmer programs secure simply surely systems terrorists
The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme.
businesses deployed detection devices happens products secure site smaller standard stronger system
What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. But those things can be exploited.
becoming best credit hacking jobs money stealing systems using worked
My hacking was all about becoming the best at circumventing security. So when I was a fugitive, I worked systems administrator jobs to make money. I wasn't stealing money or using other people's credit cards. I was doing a 9-to-5 job.
exploiting explore hacking network systems telephone type
Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees.
alarm average checks download needs program recommend running system zone
For the average home-user, anti-virus software is a must. A personal firewall such as Zone Alarm and running a program like HFNetcheck, which is a free download for personal users. It checks your system to see if anything needs to be patched. I'd also recommend a program such as SpyCop to periodically check for any spyware on your system.
access code computer exploring hacking involved obtaining operating source systems within
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.
access account address companies computer contain devices dollars link measures millions money none operate people protected secure systems wasted weakest
Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information.
american-celebrity human message primary social speaking threat today
My message today is primary the same... I usually go around speaking on the threat of the human element, particularly on social engineering.
definitely turned
The hacking trend has definitely turned criminal because of e-commerce.
entertainment fbi hacking huge longer mind occupy video
Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.
money
I wasn't a hacker for the money, and it wasn't to cause damage.
becoming cyberspace exploiting hackers human nature next technical ways
Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.
bite criminal field forbidden fruit hacking knowledge legitimate public security skill though
It's kind of interesting, because hacking is a skill that could be used for criminal purposes or legitimate purposes, and so even though in the past I was hacking for the curiosity, and the thrill, to get a bite of the forbidden fruit of knowledge, I'm now working in the security field as a public speaker.