181 Quotes by Kevin Mitnick

  • Author Kevin Mitnick
  • Quote

    I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case.

  • Tags
  • Share

  • Author Kevin Mitnick
  • Quote

    I keep my stuff updated all the time. Being in the security industry, I keep up to date with securities.

  • Tags
  • Share

  • Author Kevin Mitnick
  • Quote

    What I found personally to be true was that it's easier to manipulate people rather than technology.

  • Tags
  • Share

  • Author Kevin Mitnick
  • Quote

    Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws.

  • Tags
  • Share

  • Author Kevin Mitnick
  • Quote

    I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.

  • Tags
  • Share

  • Author Kevin Mitnick
  • Quote

    A lot of companies are clueless, because they spend most or all of their security budget on high-tech security like fire walls and biometric authentication - which are important and needed - but then they don't train their people.

  • Tags
  • Share

  • Author Kevin Mitnick
  • Quote

    I could pose as a Yahoo rep claiming that there's been some sort of fault, and somebody else is getting your e-mail, and we're going to have to remove your account and reinstall it. So what we'll do is reset the current password that you have - and by the way, what is it?

  • Tags
  • Share

  • Author Kevin Mitnick
  • Quote

    One of my all-time favorite pranks was gaining unauthorized access to the telephone switch and changing the class of service of a fellow phone phreak. When he'd attempt to make a call from home, he'd get a message telling him to deposit a dime, because the telephone company switch received input that indicated he was calling from a pay phone.

  • Tags
  • Share

  • Author Kevin Mitnick
  • Quote

    Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted.

  • Tags
  • Share