Kevin Mitnick Quotes

Powerful Kevin Mitnick for Daily Growth

About Kevin Mitnick

Kevin David Mitnick, commonly known as 'Kevin Mitnick', is an American computer security consultant, author, and hacker. Born on August 6, 1963, in Marin County, California, Mitnick's interest in technology was sparked at a young age. He dropped out of high school to pursue his passion for computers, leading him down a controversial path that would eventually earn him the title 'world's most wanted computer hacker'. In 1979, Mitnick, just 16 years old, hacked into MIT's AI Lab and the Computer Science Department at the University of California, Berkeley. This was the beginning of a decade-long career in computer hacking that would see him break into major corporations, government systems, and even the phone system of the Los Angeles County Sheriff's department. In 1988, the FBI launched a manhunt for Mitnick, who had by then gained international notoriety. He was finally captured in 1995 and spent five years in prison, during which time he wrote his first book, 'The Art of Intrusion'. Upon his release, Mitnick turned his skills from hacking illegally to helping corporations defend themselves against cyber threats. He founded Mitnick Security Consulting and has since worked with many high-profile clients. His bestselling autobiography, 'Turbulence', was published in 1999. Mitnick is now a respected author and keynote speaker on the subject of cybersecurity. His works include 'The Art of Deception' (2002) and 'Ghost in the Wires' (2011), both of which offer insights into his past exploits as well as guidance for safeguarding computer systems. Mitnick continues to advocate for ethical hacking and responsible disclosure, serving as a reminder that even those who stray from the path can find redemption and make a positive impact.

Interpretations of Popular Quotes

"The Internet is a tool, and like any tool, it can be used for good or ill."

This quote by Kevin Mitnick emphasizes that the internet, like any other tool, is neutral in its essence but holds immense potential for both constructive and destructive purposes. It underscores the importance of responsible use and understanding that the impact we have on the digital world depends on our intentions and actions.


"Hacking is like playing chess with computers instead of people... and the internet is the board."

This quote by Kevin Mitnick, a well-known hacker, compares hacking to playing chess, suggesting that it's a strategic game played not against people directly but against computer systems and networks. The "board" in this context is the internet, emphasizing the global, interconnected nature of modern technology where these exploits often take place. In essence, Mitnick encapsulates hacking as a cerebral challenge that demands keen technical skills and strategic thinking, much like chess does for players.


"When I was hacking, I felt like I was living life on easy mode. In reality, I was just escaping from it."

This quote by Kevin Mitnick implies that his act of hacking provided an escape from the challenges and complexities of real life. By hacking, he found a simpler, more manageable environment where he could exert control and skill, which was a stark contrast to the difficulties he faced in everyday living. Essentially, hacking offered him a temporary reprieve from the intricacies of his personal issues, making it feel like an easier mode of existence compared to the real world.


"The more connected everything becomes, the more we have to be aware and secure our digital presence."

This quote emphasizes the increasing interconnectedness in our digital world and stresses the importance of maintaining awareness and security regarding our digital presence. As more aspects of our lives move online, we become vulnerable to potential threats such as cyberattacks, identity theft, and privacy violations. Therefore, it's crucial to stay vigilant and take necessary precautions to safeguard our personal information and digital assets.


"I don't condone hacking but I understand why people do it. It's because they want to feel powerful."

This quote by Kevin Mitnick suggests that individuals may resort to hacking as a means to experience a sense of power or control, often due to feelings of exclusion or marginalization in other areas of life. The act of hacking allows these individuals to gain access to information, systems, or environments that they might not otherwise have the opportunity to interact with, thereby empowering them. However, it's important to emphasize that while this motivation may be understood, hacking is illegal and unethical when used for malicious purposes. Instead, individuals should seek legitimate paths to gain power, influence, and a sense of control over their lives and circumstances.


A hacker doesn't deliberately destroy data or profit from his activities.

- Kevin Mitnick

Hacker, Deliberately, His, Data

Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information.

- Kevin Mitnick

Access, Link, Use, Weakest

Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.

- Kevin Mitnick

Financial, Access, Shut, Manhattan

One of my all-time favorite pranks was gaining unauthorized access to the telephone switch and changing the class of service of a fellow phone phreak. When he'd attempt to make a call from home, he'd get a message telling him to deposit a dime, because the telephone company switch received input that indicated he was calling from a pay phone.

- Kevin Mitnick

Changing, Access, Telling, Pranks

Businesses should absolutely set aside funding in their budgets for security consultants. Unless there is an expert on staff, and there usually is not, it needs to be outsourced.

- Kevin Mitnick

Expert, Needs, Funding, Consultants

I use Spam Arrest because of the amount of junk mail I get. Any legitimate person who wants to send me a message has to jump through hoops before they can be added to my opt-in list.

- Kevin Mitnick

Through, Mail, Before, Arrest

Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else.

- Kevin Mitnick

Another, Use, Document, Compromises

Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.

- Kevin Mitnick

Access, Use, Which, Compromises

Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.

- Kevin Mitnick

Other, Use, Which, Sites

I made stupid decisions as a kid, or as a young adult, but I'm trying to be now, I'm trying to take this lemon and make lemonade.

- Kevin Mitnick

Stupid, Young, Made, Lemonade

Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.

- Kevin Mitnick

Again, Code, About, Beating

I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses.

- Kevin Mitnick

Seduction, Damage, Viruses, Stealing

I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me.

- Kevin Mitnick

Trust, Banking, Why, Credit Card

Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws.

- Kevin Mitnick

Data, Laws, About, Oracle

What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. But those things can be exploited.

- Kevin Mitnick

Cards, Standard, Smaller, Intrusion

A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.

- Kevin Mitnick

Security, Other, Dollars, Intrusion

I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.

- Kevin Mitnick

Been, Could, Had, FBI

Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.

- Kevin Mitnick

Game, Been, Occupy, FBI

All they need to do is to set up some website somewhere selling some bogus product at twenty percent of the normal market prices and people are going to be tricked into providing their credit card numbers.

- Kevin Mitnick

Numbers, Some, Providing, Bogus

I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.

- Kevin Mitnick

Doing, More, Damage, Intentionally

It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.

- Kevin Mitnick

Becoming, Code, Locate, Bugs

The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard for other people to guess.

- Kevin Mitnick

Perfect, Other, Like, Pin

It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills.

- Kevin Mitnick

Similar, Admired, Using, Possessing

The hacker mindset doesn't actually see what happens on the other side, to the victim.

- Kevin Mitnick

Mindset, See, Actually, Victim

Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.

- Kevin Mitnick

Some, Benefits, Request, Comply

Anything out there is vulnerable to attack given enough time and resources.

- Kevin Mitnick

Attack, Given, Vulnerable, Enough Time

The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president!

- Kevin Mitnick

Office, Parking, Antenna, Johnny

I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access.

- Kevin Mitnick

Doing, Access, Trick, LinkedIn

There's a feature on Facebook where you can enable security that checks the device you're coming from. By default these features are likely off, but as a consumer, you can enable them.

- Kevin Mitnick

Facebook, Them, Likely, Enable

Once when I was a fugitive, I was working for a law firm in Denver.

- Kevin Mitnick

Law, Denver, Firm, Fugitive

If you're searching for quotes on a different topic, feel free to browse our Topics page or explore a diverse collection of quotes from various Authors to find inspiration.