I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access. Kevin Mitnick accessadministratorengineer share on social
The hacker mindset doesn't actually see what happens on the other side, to the victim. Kevin Mitnick hackermindsetside Change image and share on social
Not being allowed to use the Internet is kind of like not being allowed to use a telephone. Kevin Mitnick allowinternetkind Change image and share on social
I use Spam Arrest because of the amount of junk mail I get. Any legitimate person who wants to send me a message has to jump through hoops before they can be added to my opt-in list. Kevin Mitnick addamountarrest Change image and share on social
I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case. Kevin Mitnick casechargecomputer Change image and share on social
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A. Kevin Mitnick assignmentbackclass share on social
Choosing a hard-to-guess, but easy-to-remember password is important! Kevin Mitnick chooseeasyguess Change image and share on social
I have done a lot to rehabilitate my reputation. Kevin Mitnick lotrehabilitatereputation Change image and share on social
The first programming assignment I had in high school was to find the first 100 Fibonacci numbers. Instead, I thought it would be cooler to write a program to get the teacher's password and all the other students' passwords. And the teacher gave me an A and told the class how smart I was. Kevin Mitnick assignmentclasscool share on social
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks. Kevin Mitnick attackbusinesscard share on social