Quotes by Kevin Mitnick

I saw myself as an electronic joy rider.
- Kevin Mitnick
Some people think technology has the answers.
- Kevin Mitnick
To some people I'll always be the bad guy.
- Kevin Mitnick
Check our mobile app on:
I have done a lot to rehabilitate my reputation.
- Kevin Mitnick
I was hooked in before hacking was even illegal.
- Kevin Mitnick
I happen to be notorious. That, I have no control over.
- Kevin Mitnick
At the end of the day, my goal was to be the best hacker.
- Kevin Mitnick
For the average home-user, anti-virus software is a must.
- Kevin Mitnick
The Internet is like the phone. To be without it is ridiculous.
- Kevin Mitnick
As a young boy, I was taught in high school that hacking was cool.
- Kevin Mitnick
Follow us on:
Once when I was a fugitive, I was working for a law firm in Denver.
- Kevin Mitnick
Choosing a hard-to-guess, but easy-to-remember password is important!
- Kevin Mitnick
Should we fear hackers? Intention is at the heart of this discussion.
- Kevin Mitnick
The hacking trend has definitely turned criminal because of e-commerce.
- Kevin Mitnick
I was pretty much the government's poster boy for what I had done.
- Kevin Mitnick
I wasn't a hacker for the money, and it wasn't to cause damage.
- Kevin Mitnick
Anything out there is vulnerable to attack given enough time and resources.
- Kevin Mitnick
A hacker doesn't deliberately destroy data or profit from his activities.
- Kevin Mitnick
I was an accomplished computer trespasser. I don't consider myself a thief.
- Kevin Mitnick
Of course I'm sure half the people there hate me and half the people like me.
- Kevin Mitnick
My primary goal of hacking was the intellectual curiosity, the seduction of adventure.
- Kevin Mitnick
We have problems with our physical security, operational security through to management.
- Kevin Mitnick
The hacker mindset doesn't actually see what happens on the other side, to the victim.
- Kevin Mitnick
Not being allowed to use the Internet is kind of like not being allowed to use a telephone.
- Kevin Mitnick
So the ethic I was taught in school resulted in the path I chose in my life following school.
- Kevin Mitnick
I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.
- Kevin Mitnick
Hacking is exploiting security controls either in a technical, physical or a human-based element.
- Kevin Mitnick
I did get a huge endorphin rush when I was able to crack a system because it was like a video game.
- Kevin Mitnick
I get hired to hack into computers now and sometimes it's actually easier than it was years ago.
- Kevin Mitnick
Back in my day, I would probe by hand. Now you can get commercial software that does the job for you.
- Kevin Mitnick
I keep my stuff updated all the time. Being in the security industry, I keep up to date with securities.
- Kevin Mitnick
What I found personally to be true was that it's easier to manipulate people rather than technology.
- Kevin Mitnick
Nine out of every 10 large corporations and government agencies have been attacked by computer intruders.
- Kevin Mitnick
A log-in simulator is a program to trick some unknowing user into providing their user name and password.
- Kevin Mitnick
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
- Kevin Mitnick
I was an accomplished computer trespasser. I don't consider myself a thief. I copied without permission.
- Kevin Mitnick
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon.
- Kevin Mitnick
I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast.
- Kevin Mitnick
My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime.
- Kevin Mitnick
No company that I ever hacked into reported any damages, which they were required to do for significant losses.
- Kevin Mitnick
I love solving puzzles, I love finding my way around obstacles, and I love learning new things about technology.
- Kevin Mitnick
Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984.
- Kevin Mitnick
Usually companies hire me, and they know full well who I am, and that's one of the reasons they want to hire me.
- Kevin Mitnick
I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company.
- Kevin Mitnick
Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes.
- Kevin Mitnick
When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no.
- Kevin Mitnick
The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
- Kevin Mitnick
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
- Kevin Mitnick
I made stupid decisions as a kid, or as a young adult, but I'm trying to be now, I'm trying to take this lemon and make lemonade.
- Kevin Mitnick
Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees.
- Kevin Mitnick
I'm not a fugitive anymore. Never will be in the future. After spending five years in jail, you learn your lesson. I never want to return there.
- Kevin Mitnick
I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government.
- Kevin Mitnick
My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims.
- Kevin Mitnick
I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case.
- Kevin Mitnick
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems.
- Kevin Mitnick
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
- Kevin Mitnick
You can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk.
- Kevin Mitnick
A lot of individuals out there carry a lot of proprietary information on their mobile devices, and they're not protected. It's a very target-rich environment.
- Kevin Mitnick
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing.
- Kevin Mitnick
I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses.
- Kevin Mitnick
Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.
- Kevin Mitnick
I think malware is a significant threat because the mitigation, like antivirus software, hasn't evolved to a point to really mitigate the risk to a reasonable degree.
- Kevin Mitnick
Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.
- Kevin Mitnick
So what I was essentially doing was, I compromised the confidentiality of their proprietary software to advance my agenda of becoming the best at breaking through the lock.
- Kevin Mitnick
I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we've always found a hole.
- Kevin Mitnick
Businesses should absolutely set aside funding in their budgets for security consultants. Unless there is an expert on staff, and there usually is not, it needs to be outsourced.
- Kevin Mitnick
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail.
- Kevin Mitnick
The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard for other people to guess.
- Kevin Mitnick
I use Spam Arrest because of the amount of junk mail I get. Any legitimate person who wants to send me a message has to jump through hoops before they can be added to my opt-in list.
- Kevin Mitnick
No company that I ever hacked into reported any damages, which they were required to do for significant losses. Sun didn't stop using Solaris and DEC didn't stop using VMS.
- Kevin Mitnick
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
- Kevin Mitnick
I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control.
- Kevin Mitnick
I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me.
- Kevin Mitnick
Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws.
- Kevin Mitnick
There's a feature on Facebook where you can enable security that checks the device you're coming from. By default these features are likely off, but as a consumer, you can enable them.
- Kevin Mitnick
I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all the trouble I was getting into, because I was hooked.
- Kevin Mitnick
When I read about myself in the media, even I don't recognize me. The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
- Kevin Mitnick
All they need to do is to set up some website somewhere selling some bogus product at twenty percent of the normal market prices and people are going to be tricked into providing their credit card numbers.
- Kevin Mitnick
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.
- Kevin Mitnick
Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn't have enough space on my 200 megabyte hard drive.
- Kevin Mitnick
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
- Kevin Mitnick
Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.
- Kevin Mitnick
I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.
- Kevin Mitnick
If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk.
- Kevin Mitnick
Sometimes I get a call from my bank, and the first thing they ask is, 'Mr. Mitnick, may I get your account number?' And I'll say, 'You called me! I'm not giving you my account number!'
- Kevin Mitnick
Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.
- Kevin Mitnick
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks.
- Kevin Mitnick
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
- Kevin Mitnick
Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate.
- Kevin Mitnick
I'm an expert witness in a case that's in appeal about a guy who allegedly misappropriated source code from a major, major company - he actually worked there and then apparently they found it on his laptop later.
- Kevin Mitnick
It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills.
- Kevin Mitnick
The best thing to do is always keep randomly generated passwords everywhere and use a password tool to manage it, and then you don't have to remember those passwords at all, just the master password that unlocks the database.
- Kevin Mitnick
I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it?
- Kevin Mitnick
Being on the run wasn't fun, but it was something I had to do. I was actually working in legitimate jobs. I wasn't living on people's credit cards. I was living like a character out of a movie. It was performance art.
- Kevin Mitnick
If I needed to know about a security exploit, I preferred to get the information by accessing the companies' security teams' files, rather than poring over lines of code to find it on my own. It's just more efficient.
- Kevin Mitnick
A lot of companies are clueless, because they spend most or all of their security budget on high-tech security like fire walls and biometric authentication - which are important and needed - but then they don't train their people.
- Kevin Mitnick
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A.
- Kevin Mitnick
My hacking was all about becoming the best at circumventing security. So when I was a fugitive, I worked systems administrator jobs to make money. I wasn't stealing money or using other people's credit cards. I was doing a 9-to-5 job.
- Kevin Mitnick
For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me.
- Kevin Mitnick
Our Constitution requires that the accused be presumed innocent before trial, thus granting all citizens the right to a bail hearing, where the accused has the opportunity to be represented by counsel, present evidence, and cross-examine witnesses.
- Kevin Mitnick
The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications.
- Kevin Mitnick
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.
- Kevin Mitnick
It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.
- Kevin Mitnick
If you go to a coffee shop or at the airport, and you're using open wireless, I would use a VPN service that you could subscribe for 10 bucks a month. Everything is encrypted in an encryption tunnel, so a hacker cannot tamper with your connection.
- Kevin Mitnick
But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it's still a hard sell for people.
- Kevin Mitnick
Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.
- Kevin Mitnick
Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted.
- Kevin Mitnick