I have done a lot to rehabilitate my reputation. Kevin Mitnick lotrehabilitatereputation Change image and share on social
The first programming assignment I had in high school was to find the first 100 Fibonacci numbers. Instead, I thought it would be cooler to write a program to get the teacher's password and all the other students' passwords. And the teacher gave me an A and told the class how smart I was. Kevin Mitnick assignmentclasscool share on social
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically. Kevin Mitnick allowautomaticallycomputer Change image and share on social
Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management. Kevin Mitnick awardcatconfiguration share on social
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail. Kevin Mitnick accessattachmentclick Change image and share on social
I saw myself as an electronic joy rider. Kevin Mitnick electronicjoyrider Change image and share on social
Of course I'm sure half the people there hate me and half the people like me. Kevin Mitnick halfhatepeople Change image and share on social
The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president! Kevin Mitnick antennacompanycreate share on social
What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. But those things can be exploited. Kevin Mitnick administratorauthenticationbase share on social
I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government. Kevin Mitnick corporationfeargovernment Change image and share on social