American - Businessman | August 6, 1963 -
I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access.
Kevin Mitnick
GreatSearchDoingI CanEngineers
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.
TechnologyMoneySecurityPerson
I saw myself as an electronic joy rider.
MyselfJoySawRiderElectronic
For the average home-user, anti-virus software is a must. A personal firewall such as Zone Alarm and running a program like HFNetcheck, which is a free download for personal users. It checks your system to see if anything needs to be patched. I'd also recommend a program such as SpyCop to periodically check for any spyware on your system.
FreePersonalSoftwareSeeAnything
The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president!
ThinkCreatingHackerOfficeParking
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon.
DetailsNumbersImportantGarbage
I happen to be notorious. That, I have no control over.
ControlOverHappenNotorious
For the average home-user, anti-virus software is a must.
SoftwareAverageMustAnti-Virus
I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses.
ChallengeAdventureWritingCuriosity
I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me.
TrustMeLossCreditYouKnow
Hacking is exploiting security controls either in a technical, physical or a human-based element.
SecurityHackingTechnicalEither
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else.
PeopleControlManagementProblem
Copyright © 2024 QuotesDict Kevin Mitnick quotes