American - Businessman | August 6, 1963 -
A hacker doesn't deliberately destroy data or profit from his activities.
Kevin Mitnick
DataProfitHackerDestroyHis
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
KeyEngineeringInformationPerson
I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.
MyselfSupportMeNameDoingHelp
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A.
TeacherSchoolMeHigh SchoolThink
I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government.
GovernmentWorldLovedMagicHacker
Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management.
DayPeopleManagementGameAward
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
NowHackerNeverDifferencePaid
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
MyselfSecurityKnowHackerImprove
The hacking trend has definitely turned criminal because of e-commerce.
HackingE-CommerceTrendCriminal
I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company.
ControlBetterPhoneHackerCompany
Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.
OrganizationInfluenceActionPerson
Anything out there is vulnerable to attack given enough time and resources.
TimeEnoughResourcesOutAnything
Copyright © 2024 QuotesDict Kevin Mitnick quotes