Occupation: Consultant Birth: August 6, 1963
We have problems with our physical security, operational security through to management..
You can never protect yourself 100%. What you do is protect your self as much as possible and mitigate risk to an acceptable degree. You can never re….
The human. Now you know all about your target.
I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all th….
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click….
Social engineering bypasses all technologies, including firewalls..
There is no patch for stupidity..
Social engineers veil themselves in a cloak of believability..
For the average home-user, anti-virus software is a must..
It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was ….
Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I di….
The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and educa….
I get hired to hack into computers now and sometimes it's actually easier than it was years ago..
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if….
Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984..
I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in s….
Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people tha….
I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrat….
But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive se….
When I was in prison, a Colombian drug lord, offered me $5 million in cash to manipulate a computer system so that he would be released. I turned him….
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon..