Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984. Kevin Mitnick applecomputeear Change image and share on social
The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard for other people to guess. Kevin Mitnick digiteasyguess Change image and share on social
People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures. Kevin Mitnick appearauthorityconvince share on social
For the average home-user, anti-virus software is a must. A personal firewall such as Zone Alarm and running a program like HFNetcheck, which is a free download for personal users. It checks your system to see if anything needs to be patched. I'd also recommend a program such as SpyCop to periodically check for any spyware on your system. Kevin Mitnick alarmantiaverage share on social
All they need to do is to set up some website somewhere selling some bogus product at twenty percent of the normal market prices and people are going to be tricked into providing their credit card numbers. Kevin Mitnick boguscardcredit share on social
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against. Kevin Mitnick accessattackercall Change image and share on social
Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker. Kevin Mitnick actionattackerbenefit share on social
Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees. Kevin Mitnick companyemployeeexploit Change image and share on social