The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully.
Kevin MitnickItโs actually a smarter crime because imagine if you rob a bank, or youโre dealing drugs. If you get caught youโre going to spend a lot of time in custody. But with hacking, itโs much easier to commit the crime and the risk of punishment is slim to none.
Kevin MitnickAll they need to do is to set up some website somewhere selling some bogus product at twenty percent of the normal market prices and people are going to be tricked into providing their credit card numbers.
Kevin MitnickOracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws.
Kevin Mitnick