The hacking trend has definitely turned criminal because of e-commerce. Kevin Mitnick commercecriminalhack Change image and share on social
One of my all-time favorite pranks was gaining unauthorized access to the telephone switch and changing the class of service of a fellow phone phreak. When he'd attempt to make a call from home, he'd get a message telling him to deposit a dime, because the telephone company switch received input that indicated he was calling from a pay phone. Kevin Mitnick accessattemptcall share on social
But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it's still a hard sell for people. Kevin Mitnick businesshardinvestment share on social
I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company. Kevin Mitnick companycontrolfascinate Change image and share on social
For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me. Kevin Mitnick binexplaininternet share on social
I could pose as a Yahoo rep claiming that there's been some sort of fault, and somebody else is getting your e-mail, and we're going to have to remove your account and reinstall it. So what we'll do is reset the current password that you have - and by the way, what is it? Kevin Mitnick accountclaimcurrent share on social
Think about it: if you were running a multi-million dollar company, and your database of customer information was stolen, would you want to tell your clients? No. Most companies did not until the laws required them to. It's in the best interest of organisations - when they're attacked and information is stolen - to tell nobody. Kevin Mitnick attackclientcompany share on social
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else. Kevin Mitnick boobycompletecompromise share on social
A hacker doesn't deliberately destroy data or profit from his activities. Kevin Mitnick activitydatumdeliberately Change image and share on social
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks. Kevin Mitnick attackbusinesscard share on social