I was an accomplished computer trespasser. I don't consider myself a thief.
From Kevin Mitnick
I saw myself as an electronic joy rider.
Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate.
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing.
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon.
Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws.
I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we've always found a hole.
The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems.
For the average home-user, anti-virus software is a must.
29 perspectives
19 perspectives
18 perspectives
16 perspectives
15 perspectives
3 perspectives
2 perspectives