Kevin Mitnick
Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
asks favor involving somebody verify
When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no.
The Internet is like the phone. To be without it is ridiculous.
Not being allowed to use the Internet is kind of like not being allowed to use a telephone.
hacking hooked
I was hooked in before hacking was even illegal.
I was an accomplished computer trespasser. I don't consider myself a thief.
electronic james saw
I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast.
I have done a lot to rehabilitate my reputation.
given time vulnerable
Anything out there is vulnerable to attack given enough time and resources.
providing trick
A log-in simulator is a program to trick some unknowing user into providing their user name and password.
access computer defend extremely key spear technique
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
anybody anyone committing criminal greater higher involve obviously people reduce wants
If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk.
american-celebrity beating best case code enjoyed hacker security source
Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.
becoming best credit hacking jobs money stealing systems using worked
My hacking was all about becoming the best at circumventing security. So when I was a fugitive, I worked systems administrator jobs to make money. I wasn't stealing money or using other people's credit cards. I was doing a 9-to-5 job.
bad everyday guy information item obtaining people piece protected seems starts
Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted.