It doesn't work the same way everywhere. The Americans are the most gullible, because they don't like to deny co-workers' requests. People in the former Soviet bloc countries are less trusting, perhaps because of their previous experiences with their countries' secret services. Kevin Mitnick americanbloccountry share on social
I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access. Kevin Mitnick accessadministratorengineer share on social
The hacker mindset doesn't actually see what happens on the other side, to the victim. Kevin Mitnick hackermindsetside Change image and share on social
Not being allowed to use the Internet is kind of like not being allowed to use a telephone. Kevin Mitnick allowinternetkind Change image and share on social
I use Spam Arrest because of the amount of junk mail I get. Any legitimate person who wants to send me a message has to jump through hoops before they can be added to my opt-in list. Kevin Mitnick addamountarrest Change image and share on social
I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case. Kevin Mitnick casechargecomputer Change image and share on social
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A. Kevin Mitnick assignmentbackclass share on social
Choosing a hard-to-guess, but easy-to-remember password is important! Kevin Mitnick chooseeasyguess Change image and share on social
I have done a lot to rehabilitate my reputation. Kevin Mitnick lotrehabilitatereputation Change image and share on social
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks. Kevin Mitnick attackbusinesscard share on social