The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
Kevin MitnickSocial engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.
Kevin MitnickI could have evaded the FBI a lot longer if I had been able to control my passion for hacking.
Kevin MitnickWe have problems with our physical security, operational security through to management.
Kevin MitnickI use Mac. Not because it's more secure than everything else - because it is actually less secure than Windows - but I use it because it is still under the radar. People who write malicious code want the greatest return on their investment, so they target Windows systems. I still work with Windows in virtual machines.
Kevin Mitnick