Quotesia
Home
Authors
Popular authors
Helen Rowland
John Paul Jones
Pearl S. Buck
Iris Murdoch
Aldous Huxley
Edgar Allan Poe
All authors
Today's birthdays
1911 - Emil Cioran
1938 - Kofi Annan
1892 - Mary Pickford
1947 - Robert Kiyosaki
1983 - Allu Arjun
1912 - Sonja Henie
Today's birthdays
Popular professions
President
Coach
Actor
Philosopher
Astronaut
Architect
All professions
Authors by letter
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All authors
Topics
Top Quotes
Quotesia
Favorite authors
Kevin Mitnick Quotes
Kevin Mitnick Quotes
Kevin Mitnick
American
Businessman
Born:
Aug 6
,
1963
Because
Computer
Hacker
Me
People
You
Related authors:
Bill Gates
Henry Ford
Jim Rohn
Les Brown
Peter Drucker
Stephen Covey
Steve Jobs
Warren Buffett
I have done a lot to rehabilitate my reputation.
Kevin Mitnick
Reputation
Lot
Done
Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes.
Kevin Mitnick
You
Worm
Back
Back Up
Everything
Data
Catastrophic
Takes
Loss
Up
Happen
The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme.
Kevin Mitnick
Government
Will
Stupid
Think
Enough
Programs
Back
Back Door
Secure
Systems
Insisting
Scheme
No-One
Simply
Come
Like
Surely
Does
Terrorists
Hire
Encryption
Up
Going
Door
Should
Use
Things
Programmer
If I needed to know about a security exploit, I preferred to get the information by accessing the companies' security teams' files, rather than poring over lines of code to find it on my own. It's just more efficient.
Kevin Mitnick
Own
Security
Find
About
My Own
Rather
More
Over
Know
Lines
Efficient
Than
Get
Just
Information
Preferred
Exploit
Companies
Files
Teams
Code
Needed
I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case.
Kevin Mitnick
Charged
Case
Computer
Hacking
Know
Involves
Were
Any
Where
Multiple
For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me.
Kevin Mitnick
Time
Me
People
Internet
Thought
Long
Long Time
Side
Tell
Exactly
Exactly What
Able
Knew
Did
Wanted
Story
Explain
Really
Who
Bin
Portrayed
Nine out of every 10 large corporations and government agencies have been attacked by computer intruders.
Kevin Mitnick
Government
Every
Nine
Corporations
Out
Attacked
Computer
Government Agencies
Been
Agencies
Large
Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted.
Kevin Mitnick
People
Organization
Innocent
Starts
Everyday
Penetrating
Bad
Security
See
Some
Bad Guy
Restricted
Seems
Guy
Most
Piece
Obtaining
Protected
Item
Any
Often
Information
Should
Unimportant
Reason
Company
Why
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.
Kevin Mitnick
Technology
Money
Other
Spend
Hundreds
Hundreds Of Thousands
Spent
Systems
Security
Thousands
Detection
Intrusion
Call
Within
Dollars
Encryption
Trusted
Person
Gets
Essentially
Then
Company
Wasted
Technologies
People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures.
Kevin Mitnick
People
Fear
Engineer
Shortcuts
Nice
Out
Security
Triggers
Prone
Perceived
Mental
Give
Taking
Know
Override
Person
Authority
May
Established
Being
Procedures
Information
Which
Social
Being Nice
Convince
Certain
Ignorant
Used
Figure
Appearing
Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.
Kevin Mitnick
Benefits
Organization
Engineering
Action
Release
Comply
Insider
Some
Perform
Sort
Within
Item
Trusted
Person
Get
Influence
Deception
Information
Social
Manipulation
Request
Social Engineering
Using
A hacker doesn't deliberately destroy data or profit from his activities.
Kevin Mitnick
Hacker
Profit
Destroy
Data
Deliberately
His
Activities
Think about it: if you were running a multi-million dollar company, and your database of customer information was stolen, would you want to tell your clients? No. Most companies did not until the laws required them to. It's in the best interest of organisations - when they're attacked and information is stolen - to tell nobody.
Kevin Mitnick
Best
You
Think
Tell
Would
Running
About
Laws
Database
Attacked
Nobody
Most
Until
Clients
Were
Dollar
Did
Stolen
Want
Information
Interest
Customer
Them
Organisations
Required
Your
Companies
Company
Should we fear hackers? Intention is at the heart of this discussion.
Kevin Mitnick
Heart
Fear
Hackers
Discussion
Intention
Should
The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president!
Kevin Mitnick
Hacker
Think
President
Emails
Threatening
Network
Johnny
Networks
Parking
Parking Lot
Wireless
Vulnerabilities
Limited
Antenna
Lot
Office
Send
Deploying
Then
Creating
Explosion
Companies
Using
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks.
Kevin Mitnick
You
Mistake
Made
Thinking
Compliant
Must
Immune
Web
Web Site
Attacks
Make
Because
Passed
Site
Via
Transactions
Requirements
Your
Certified
Businesses
Credit
Card
Credit Card
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
Kevin Mitnick
Key
Difficult
Extremely
About
Compromises
Computer
Most
Access
Hear
Person
Which
Against
Use
Spear
Technique
Defend
Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees.
Kevin Mitnick
You
Phone
Employees
Type
Telephone
Systems
Network
Hacking
Exploiting
Explore
Company
Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.
Kevin Mitnick
Day
Financial
Cause
Down
Telephone
Say
Hassle
Objectives
More
Results
Computer
Casualties
Hacking
Like
Access
Terrorist
Losses
Manhattan
Really
Cyber
Therefore
Groups
Serious
Switch
Shut
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing.
Kevin Mitnick
Game
System
Security
Administrators
Constantly
Networking
Hackers
Wireless
Between
New
Loopholes
Because
Still
Up
Full
Popping
Swing
I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government.
Kevin Mitnick
Government
World
Hacker
Corporations
Kid
Tricks
Feared
Magic
Perform
Most
Becoming
Being
Loved
Notorious
Who
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
Kevin Mitnick
Myself
Hacker
Characterize
Security
Retired
Know
Improve
Companies
Applying
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else.
Kevin Mitnick
You
People
Management
Problem
Somebody
Hacker
Control
Else
Complete
Everywhere
Compromises
Could
Computer
Open
Soon
Major
Major Problem
Document
Another
Office
Site
Same
Send
Sites
Use
Your
Trap
File
Multiple
I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.
Kevin Mitnick
Myself
Me
Hacker
Ways
Plight
More
Never
Support
Name
Doing
Causing
Malicious
Condone
Intentionally
Anyone
Anything
Productive
Help
Damage
Damaged
But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it's still a hard sell for people.
Kevin Mitnick
People
Out
Security
See
Gives
Investment
Look
Until
Return
Returns
Understand
Still
Lot
Sell
Proactive
Them
Hard
Businesses
Actually
Liability
I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control.
Kevin Mitnick
Time
Control
Believe
Enough
Enough Time
Responding
Secured
Rather
Having
Network
Device
Than
Short
Just
Then
Each
Monitoring
Damage
Load more quotes
No more Kevin Mitnick quotes
Haven't find the right quote? Try quotes from authors related to Kevin Mitnick.
Bill Gates
Henry Ford
Jim Rohn
Les Brown