Some people think technology has the answers.
Garbage can provide important details for hackers: names, telephone numbers, a company’s internal jargon.
Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.
All they need to do is to set up some website somewhere selling some bogus product at twenty percent of the normal market prices and people are going to be tricked into providing their credit card numbers.
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing.
My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government’s false claims.
For the average home-user, anti-virus software is a must.
I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control.
But a lot of businesses out there don’t see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it’s still a hard sell for people.
Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984.
I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we’ve always found a hole.
I was pretty much the government’s poster boy for what I had done.
The human. Now you know all about your target.
You can’t go to Windows Update and get a patch for stupidity.
I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me.
If you go to a coffee shop or at the airport, and you’re using open wireless, I would use a VPN service that you could subscribe for 10 bucks a month. Everything is encrypted in an encryption tunnel, so a hacker cannot tamper with your connection.
A hacker doesnt deliberately destroy data or profit from his activities.
Back in my day, I would probe by hand. Now you can get commercial software that does the job for you.
I did get a huge endorphin rush when I was able to crack a system because it was like a video game.
I characterize myself as a retired hacker. I’m applying what I know to improve security at companies.