Kevin Mitnick

Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
Kevin Mitnick quotes about
becoming feared government kid notorious perform tricks
I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government.
becoming best credit hacking jobs money stealing systems using worked
My hacking was all about becoming the best at circumventing security. So when I was a fugitive, I worked systems administrator jobs to make money. I wasn't stealing money or using other people's credit cards. I was doing a 9-to-5 job.
becoming cyberspace exploiting hackers human nature next technical ways
Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.
becoming-the-best locks agendas
So what I was essentially doing was, I compromised the confidentiality of their proprietary software to advance my agenda of becoming the best at breaking through the lock.
hacking bugs becoming
It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.
books books-and-reading case criminal dealing higher information priorities time
At the time the books were released, I was in custody, so I had higher priorities - dealing with my criminal case - than dealing with litigation. There's a lot of information out there that is inaccurate.
access code secret source
Getting access to source code . . . was kind of like the secret ingredient. I wanted to know what the secret was.
allowed computers connect connecting net networks personal prevent programs sites
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
act blank government hacks interested patriot proved spy subtle terrorists total wants
The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications.
controls either exploiting
Hacking is exploiting security controls either in a technical, physical or a human-based element.
finding learning love solving technology
I love solving puzzles, I love finding my way around obstacles, and I love learning new things about technology.
assume companies critical people proactive
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.
american-celebrity apparently appeal case code guy laptop major source witness worked
I'm an expert witness in a case that's in appeal about a guy who allegedly misappropriated source code from a major, major company - he actually worked there and then apparently they found it on his laptop later.
art credit legitimate living performance run
Being on the run wasn't fun, but it was something I had to do. I was actually working in legitimate jobs. I wasn't living on people's credit cards. I was living like a character out of a movie. It was performance art.