Just as the PC bled back into industrial economy, I think the Internet is going to bleed back into our overall economy and have a transformative effect on major sectors that we don't yet foresee.
We found that the most exciting environments, that treated people very well, are also tough as nails. There is no bureaucratic mumbo-jumbo... excellent companies provide two things simultaneously: tough environments and very supportive environments.
Today brands are everything, and all kinds of products and services - from accounting firms to sneaker makers to restaurants - are figuring out how to transcend the narrow boundaries of their categories and become a brand surrounded by a Tommy Hilfig...
Many slaves on this continent are oppressed, and their cries have reached the ears of the Most High. Such are the purity and certainty of his judgments, that he cannot be partial in our favor.
We sought out and visited all the Indians hereabouts that we could meet with, in number about twenty. They were chiefly in one place, about a mile from where we lodged.
While I meditate on the gulf towards which I travelled, and reflect on my youthful disobedience, for these things I weep, mine eye runneth down with water.
You could draw certain parallels between the structure of the Pompidou and the structure of the rocket-launching facilities at Cape Canaveral. They might not have been thinking about it, but I think there is some kind of unconscious affinity there.
You can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk.
Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benef...
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.
Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws.
Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate.
The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening ema...
All they need to do is to set up some website somewhere selling some bogus product at twenty percent of the normal market prices and people are going to be tricked into providing their credit card numbers.
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk.
But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it's still a hard sell for people.
A lot of companies are clueless, because they spend most or all of their security budget on high-tech security like fire walls and biometric authentication - which are important and needed - but then they don't train their people.
I'm an expert witness in a case that's in appeal about a guy who allegedly misappropriated source code from a major, major company - he actually worked there and then apparently they found it on his laptop later.
There's a feature on Facebook where you can enable security that checks the device you're coming from. By default these features are likely off, but as a consumer, you can enable them.
When I read about myself in the media, even I don't recognize me. The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.