Quotesdtb.com
Home
Authors
Quotes of the day
Top quotes
Topics
Kevin Mitnick quotes - page 4
What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. But those things can be exploited.
Kevin Mitnick
I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it?
Kevin Mitnick
I could pose as a Yahoo rep claiming that there's been some sort of fault, and somebody else is getting your e-mail, and we're going to have to remove your account and reinstall it. So what we'll do is reset the current password that you have - and by the way, what is it?
Kevin Mitnick
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.
Kevin Mitnick
The best thing to do is always keep randomly generated passwords everywhere and use a password tool to manage it, and then you don't have to remember those passwords at all, just the master password that unlocks the database.
Kevin Mitnick
There's a feature on Facebook where you can enable security that checks the device you're coming from. By default these features are likely off, but as a consumer, you can enable them.
Kevin Mitnick
The Internet is like the phone. To be without it is ridiculous.
Kevin Mitnick
One of my all-time favorite pranks was gaining unauthorized access to the telephone switch and changing the class of service of a fellow phone phreak. When he'd attempt to make a call from home, he'd get a message telling him to deposit a dime, because the telephone company switch received input that indicated he was calling from a pay phone.
Kevin Mitnick
I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government.
Kevin Mitnick
Not being allowed to use the Internet is kind of like not being allowed to use a telephone.
Kevin Mitnick
The hacking trend has definitely turned criminal because of e-commerce.
Kevin Mitnick
The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme.
Kevin Mitnick
If I needed to know about a security exploit, I preferred to get the information by accessing the companies' security teams' files, rather than poring over lines of code to find it on my own. It's just more efficient.
Kevin Mitnick
Think about it: if you were running a multi-million dollar company, and your database of customer information was stolen, would you want to tell your clients? No. Most companies did not until the laws required them to. It's in the best interest of organisations - when they're attacked and information is stolen - to tell nobody.
Kevin Mitnick
I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case.
Kevin Mitnick
Nine out of every 10 large corporations and government agencies have been attacked by computer intruders.
Kevin Mitnick
I happen to be notorious. That, I have no control over.
Kevin Mitnick
Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted.
Kevin Mitnick
To some people I'll always be the bad guy.
Kevin Mitnick
Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information.
Kevin Mitnick
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.
Kevin Mitnick
Anything out there is vulnerable to attack given enough time and resources.
Kevin Mitnick
Previous
1
2
3
4
(Current)
5
Next