Once when I was a fugitive, I was working for a law firm in Denver. Kevin Mitnick denverfirmfugitive Change image and share on social
I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all the trouble I was getting into, because I was hooked. Kevin Mitnick gamehackhook Change image and share on social
No company that I ever hacked into reported any damages, which they were required to do for significant losses. Kevin Mitnick companydamagehack Change image and share on social
The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme. Kevin Mitnick backdoorencryption share on social
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies. Kevin Mitnick applycharacterizecompany Change image and share on social
Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking. Kevin Mitnick consequencecontrolentertainment share on social
The best thing to do is always keep randomly generated passwords everywhere and use a password tool to manage it, and then you don't have to remember those passwords at all, just the master password that unlocks the database. Kevin Mitnick databasegeneratemanage share on social
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization. Kevin Mitnick authorizationcomparedifference share on social
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems. Kevin Mitnick accesscodecomputer share on social
Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders. Kevin Mitnick conjurecyberspaceexploit share on social