Should we fear hackers? Intention is at the heart of this discussion. Kevin Mitnick discussionfearhacker Change image and share on social
Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. Kevin Mitnick actionconductdegree Change image and share on social
Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties. Kevin Mitnick accesscasualtycomputer share on social
No company that I ever hacked into reported any damages, which they were required to do for significant losses. Kevin Mitnick companydamagehack Change image and share on social
So what I was essentially doing was, I compromised the confidentiality of their proprietary software to advance my agenda of becoming the best at breaking through the lock. Kevin Mitnick advanceagendumbreak Change image and share on social
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A. Kevin Mitnick assignmentbackclass share on social
Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws. Kevin Mitnick competitorcoverdatum Change image and share on social
Our Constitution requires that the accused be presumed innocent before trial, thus granting all citizens the right to a bail hearing, where the accused has the opportunity to be represented by counsel, present evidence, and cross-examine witnesses. Kevin Mitnick accusebailcitizen share on social
Nine out of every 10 large corporations and government agencies have been attacked by computer intruders. Kevin Mitnick agencyattackcomputer Change image and share on social
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks. Kevin Mitnick attackbusinesscard share on social