Occupation: Consultant Birth: August 6, 1963
I use Mac. Not because it's more secure than everything else - because it is actually less secure than Windows - but I use it because it is still und….
For the average home-user, anti-virus software is a must..
I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess….
Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people tha….
I get hired to hack into computers now and sometimes it's actually easier than it was years ago..
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network..
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is ….
The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and educa….
I obtained confidential information in the same way government employees did, and I did it all without even touching a computer. ... I was so success….
Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984..
I was pretty much the government's poster boy for what I had done..
I made stupid decisions as a kid, or as a young adult, but I'm trying to be now, I'm trying to take this lemon and make lemonade..
The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard ….
I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or wri….
Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appr….
So the ethic I was taught in school resulted in the path I chose in my life following school..
Some people think technology has the answers..
I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrat….
If you go to a coffee shop or at the airport, and you're using open wireless, I would use a VPN service that you could subscribe for 10 bucks a month….
I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we've ….
Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn….