FastSaying

When a hacker gains access to any corporate data, the value of that data depends on which server, or sometimes a single person's computer, that the hacker gains access to.

John McAfee

John McAfee

AccessAnyComputerCorporateDataDependsGainsHackerPersonServerSingleSometimesValueWhich

Related Quotes

A hacker is someone who uses a combination of high-tech cybertools and social engineering to gain illicit access to someone else's data.
— John McAfee
AccessCombinationData
Do you think the Chinese think twice about hiring a hacker with a mohawk or a tattooed face? No.
— John McAfee
AboutChineseFace
We have several patents that are fundamental for remote access to corporate data, and now that a market for such services is emerging, we don't want anyone to benefit from our technology without paying for it.
— Daniel Méndez
AccessCorporateData
Social engineering has become about 75% of an average hacker's toolkit, and for the most successful hackers, it reaches 90% or more.
— John McAfee
AboutAverageBecome
In computer circles, any unencrypted data is known as 'cleartext.'
— Barton Gellman
AnyCirclesComputer