Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees. Kevin Mitnick companyemployeeexploit Change image and share on social
My hacking was all about becoming the best at circumventing security. So when I was a fugitive, I worked systems administrator jobs to make money. I wasn't stealing money or using other people's credit cards. I was doing a 9-to-5 job. Kevin Mitnick administratorcardcircumvent share on social
I use Mac. Not because it's more secure than everything else - because it is actually less secure than Windows - but I use it because it is still under the radar. People who write malicious code want the greatest return on their investment, so they target Windows systems. I still work with Windows in virtual machines. Kevin Mitnick codegreatinvestment share on social
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization. Kevin Mitnick authorizationcomparedifference share on social
Think about it: if you were running a multi-million dollar company, and your database of customer information was stolen, would you want to tell your clients? No. Most companies did not until the laws required them to. It's in the best interest of organisations - when they're attacked and information is stolen - to tell nobody. Kevin Mitnick attackclientcompany share on social
I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast. Kevin Mitnick blastbondcomputer Change image and share on social
I think malware is a significant threat because the mitigation, like antivirus software, hasn't evolved to a point to really mitigate the risk to a reasonable degree. Kevin Mitnick antivirusdegreeevolve Change image and share on social
It's actually a smarter crime because imagine if you rob a bank, or you're dealing drugs. If you get caught you're going to spend a lot of time in custody. But with hacking, it's much easier to commit the crime and the risk of punishment is slim to none. Kevin Mitnick bankcatchcommit share on social
Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate. Kevin Mitnick attackbigengineer share on social
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks. Kevin Mitnick attackbusinesscard share on social