Kevin Mitnick

Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
Kevin Mitnick quotes about
becoming cyberspace exploiting hackers human nature next technical ways
Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.
data hackers profit
A hacker doesnt deliberately destroy data or profit from his activities.
hackers company retired
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
hacking hackers individual
The intent of the individuals who created the DDoS attacks has nothing to do with hacking, and they are vandals, not hackers.
sides hackers mindset
The hacker mindset doesn't actually see what happens on the other side, to the victim.
heart hackers intention
Should we fear hackers? Intention is at the heart of this discussion.
books books-and-reading case criminal dealing higher information priorities time
At the time the books were released, I was in custody, so I had higher priorities - dealing with my criminal case - than dealing with litigation. There's a lot of information out there that is inaccurate.
access code secret source
Getting access to source code . . . was kind of like the secret ingredient. I wanted to know what the secret was.
allowed computers connect connecting net networks personal prevent programs sites
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
act blank government hacks interested patriot proved spy subtle terrorists total wants
The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications.
controls either exploiting
Hacking is exploiting security controls either in a technical, physical or a human-based element.
finding learning love solving technology
I love solving puzzles, I love finding my way around obstacles, and I love learning new things about technology.
assume companies critical people proactive
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.
american-celebrity apparently appeal case code guy laptop major source witness worked
I'm an expert witness in a case that's in appeal about a guy who allegedly misappropriated source code from a major, major company - he actually worked there and then apparently they found it on his laptop later.