I was an accomplished computer trespasser. I don't consider myself a thief. Kevin Mitnick accomplishcomputerthief Change image and share on social
Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information. Kevin Mitnick accessaccountaddress share on social
There's a feature on Facebook where you can enable security that checks the device you're coming from. By default these features are likely off, but as a consumer, you can enable them. Kevin Mitnick checkcomeconsumer Change image and share on social
If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk. Kevin Mitnick actcirclecommit share on social
I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it? Kevin Mitnick capabilitycircumventcompany share on social
Should we fear hackers? Intention is at the heart of this discussion. Kevin Mitnick discussionfearhacker Change image and share on social
Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. Kevin Mitnick actionconductdegree Change image and share on social
Protecting yourself is very challenging in the hostile environment of the Internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses and exploit them to gain access to your most sensitive secrets. Kevin Mitnick accesschallengecomputer share on social
Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws. Kevin Mitnick competitorcoverdatum Change image and share on social
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks. Kevin Mitnick attackbusinesscard share on social