FastSaying

Protecting yourself is very challenging in the hostile environment of the Internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses and exploit them to gain access to your most sensitive secrets.

Kevin Mitnick

Kevin Mitnick

AccessChallengingComputerEnvironmentExploitGainGlobalHostileImagineInternetMostOtherPersonPlanetProbeProtectingSecretsSensitiveSideThemVeryWeaknessesWhereYourYourself

Related Quotes

The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
— Kevin Mitnick
AccessEngineeringGain
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
— Kevin Mitnick
AboutAccessAgainst
The hacker mindset doesn't actually see what happens on the other side, to the victim.
— Kevin Mitnick
ActuallyHackerHappens
A lot of individuals out there carry a lot of proprietary information on their mobile devices, and they're not protected. It's a very target-rich environment.
— Kevin Mitnick
CarryDevicesEnvironment
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail.
— Kevin Mitnick
AccessAttachmentClick