A hacker doesn't deliberately destroy data or profit from his activities. Download Download Share on Facebook Share on Twitter Rotate quotes activity datum deliberately
Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker. Kevin Mitnick actionattackerbenefit share on social
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else. Kevin Mitnick boobycompletecompromise share on social
I use Mac. Not because it's more secure than everything else - because it is actually less secure than Windows - but I use it because it is still under the radar. People who write malicious code want the greatest return on their investment, so they target Windows systems. I still work with Windows in virtual machines. Kevin Mitnick codegreatinvestment share on social
Every time you log in to Facebook, every time you click on your News Feed, every time you Like a photo, every time you send anything via Messenger, you add another data point to the galaxy they already have regarding you and your behavior. Jon Evans addbehaviorclick share on social
It's tremendously undemocratic in a democratic society when you deliberately disenfranchise thousands of people. Pete Gallego deliberatelydemocraticdisenfranchise Change image and share on social
If a man made himself an expert in any particular branch of human activity, there would result the strong tendency that a peculiar aptitude towards the same branch would be found among some of his descendants. Sidney Lanier activityaptitudebranch share on social