Occupation: Consultant Birth: August 6, 1963
Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn….
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government system….
I saw myself as an electronic joy rider..
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon..
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is ….
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network..
No company that I ever hacked into reported any damages, which they were required to do for significant losses. Sun didn't stop using Solaris and DEC….
When I was in prison, a Colombian drug lord, offered me $5 million in cash to manipulate a computer system so that he would be released. I turned him….
But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive se….
My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime..
I did get a huge endorphin rush when I was able to crack a system because it was like a video game..
There is no patch for stupidity..
Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber g….
Social engineers veil themselves in a cloak of believability..
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click….
Social engineering bypasses all technologies, including firewalls..
The human. Now you know all about your target.
So what I was essentially doing was, I compromised the confidentiality of their proprietary software to advance my agenda of becoming the best at bre….
A hacker doesnt deliberately destroy data or profit from his activities..
The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard ….
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big ….