My primary goal of hacking was the intellectual curiosity, the seduction of adventure. Kevin Mitnick adventurecuriositygoal Change image and share on social
It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills. Kevin Mitnick admirecomputerdecade share on social
I'm not a fugitive anymore. Never will be in the future. After spending five years in jail, you learn your lesson. I never want to return there. Kevin Mitnick anymorefugitivefuture Change image and share on social
People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures. Kevin Mitnick appearauthorityconvince share on social
I was an accomplished computer trespasser. I don't consider myself a thief. Kevin Mitnick accomplishcomputerthief Change image and share on social
There's a feature on Facebook where you can enable security that checks the device you're coming from. By default these features are likely off, but as a consumer, you can enable them. Kevin Mitnick checkcomeconsumer Change image and share on social
If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk. Kevin Mitnick actcirclecommit share on social
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else. Kevin Mitnick boobycompletecompromise share on social
When an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find. Kevin Mitnick actattackattacker share on social
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks. Kevin Mitnick attackbusinesscard share on social