No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems. Kevin Mitnick accessattemptbreak Change image and share on social
My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims. Kevin Mitnick actionclaimcompany Change image and share on social
I was pretty much the government's poster boy for what I had done. Kevin Mitnick boygovernmentposter Change image and share on social
I could pose as a Yahoo rep claiming that there's been some sort of fault, and somebody else is getting your e-mail, and we're going to have to remove your account and reinstall it. So what we'll do is reset the current password that you have - and by the way, what is it? Kevin Mitnick accountclaimcurrent share on social
What I found personally to be true was that it's easier to manipulate people rather than technology. Kevin Mitnick easyfindmanipulate Change image and share on social
I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control. Kevin Mitnick controldamagedevice Change image and share on social
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business. Kevin Mitnick bigbreakbusiness Change image and share on social
I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company. Kevin Mitnick companycontrolfascinate Change image and share on social
Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted. Kevin Mitnick badcompanyeveryday share on social
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks. Kevin Mitnick attackbusinesscard share on social