Choose language

Forgot your password?

Need a Spoofbox account? Create one for FREE!

No subscription or hidden extras

Login

#p

Read through the most famous quotes by topic #p




Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.


Kevin Mitnick


#any #cause #conduct #degree #depends

I made stupid decisions as a kid, or as a young adult, but I'm trying to be now, I'm trying to take this lemon and make lemonade.


Kevin Mitnick


#decisions #i #kid #lemon #lemonade

Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn't have enough space on my 200 megabyte hard drive.


Kevin Mitnick


#any #basically #because #code #compromised

Back in my day, I would probe by hand. Now you can get commercial software that does the job for you.


Kevin Mitnick


#commercial #day #does #get #hand

Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate.


Kevin Mitnick


#appropriate #attacks #big #both #engineering

But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it's still a hard sell for people.


Kevin Mitnick


#businesses #gives #hard #investment #liability

Choosing a hard-to-guess, but easy-to-remember password is important!


Kevin Mitnick


#important

Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.


Kevin Mitnick


#casualties #cause #computer #cyber #day

I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control.


Kevin Mitnick


#control #damage #device #each #enough

I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access.


Kevin Mitnick


#administrator #because #come #doing #engineers






back to top