The hacker mindset doesn't actually see what happens on the other side, to the victim. Kevin Mitnick More Quotes by Kevin Mitnick More Quotes From Kevin Mitnick Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. Kevin Mitnick degrees causes action I get hired to hack into computers now and sometimes it's actually easier than it was years ago. Kevin Mitnick computer sometimes years Should we fear hackers? Intention is at the heart of this discussion. Kevin Mitnick hackers intention heart Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws. Kevin Mitnick data law people It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills. Kevin Mitnick computer skills people Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn't have enough space on my 200 megabyte hard drive. Kevin Mitnick able space enough When I was in prison, a Colombian drug lord, offered me $5 million in cash to manipulate a computer system so that he would be released. I turned him down. Kevin Mitnick cash drug would-be I obtained confidential information in the same way government employees did, and I did it all without even touching a computer. ... I was so successful with this line of attack that I rarely had to go towards a technical attack. Kevin Mitnick touching government successful I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access. Kevin Mitnick target lists rights The human. Now you know all about your target Kevin Mitnick target humans knows Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon. Kevin Mitnick garbage-cans names numbers Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties. Kevin Mitnick terrorist-groups manhattan loss I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization. Kevin Mitnick hacking gains differences If you go to a coffee shop or at the airport, and you're using open wireless, I would use a VPN service that you could subscribe for 10 bucks a month. Everything is encrypted in an encryption tunnel, so a hacker cannot tamper with your connection. Kevin Mitnick airports coffee tunnels I was pretty much the government's poster boy for what I had done. Kevin Mitnick government done boys The intent of the individuals who created the DDoS attacks has nothing to do with hacking, and they are vandals, not hackers. Kevin Mitnick hacking hackers individual I characterize myself as a retired hacker. I'm applying what I know to improve security at companies. Kevin Mitnick retired hackers company I saw myself as an electronic joy rider. Kevin Mitnick riders saws joy I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control. Kevin Mitnick damage-control enough-time believe I made stupid decisions as a kid, or as a young adult, but I'm trying to be now, I'm trying to take this lemon and make lemonade. Kevin Mitnick stupid funny kids