Occupation: Consultant Birth: August 6, 1963
Of course I'm sure half the people there hate me and half the people like me.
We have problems with our physical security, operational security through to management..
I did get a huge endorphin rush when I was able to crack a system because it was like a video game..
There is no patch for stupidity..
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon..
Social engineers veil themselves in a cloak of believability..
As a young boy, I was taught in high school that hacking was cool..
My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims..
Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber g….
You can never protect yourself 100%. What you do is protect your self as much as possible and mitigate risk to an acceptable degree. You can never re….
It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs,….
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big ….
You can't go to Windows Update and get a patch for stupidity..
The intent of the individuals who created the DDoS attacks has nothing to do with hacking, and they are vandals, not hackers..
I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all th….
The human. Now you know all about your target.
Social engineering bypasses all technologies, including firewalls..
The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and educa….
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click….
Companies spend millions of dollars on firewalls and secure access devices, and it's money wasted because none of these measures address the weakest ….
Choosing a hard-to-guess, but easy-to-remember password is important!.