FastSaying
When a hacker gains access to any corporate data, the value of that data depends on which server, or sometimes a single person's computer, that the hacker gains access to.
John McAfee
Access
Any
Computer
Corporate
Data
Depends
Gains
Hacker
Person
Server
Single
Sometimes
Value
Which
Related Quotes
A hacker is someone who uses a combination of high-tech cybertools and social engineering to gain illicit access to someone else's data.
— John McAfee
Access
Combination
Data
Do you think the Chinese think twice about hiring a hacker with a mohawk or a tattooed face? No.
— John McAfee
About
Chinese
Face
We have several patents that are fundamental for remote access to corporate data, and now that a market for such services is emerging, we don't want anyone to benefit from our technology without paying for it.
— Daniel Méndez
Access
Corporate
Data
Social engineering has become about 75% of an average hacker's toolkit, and for the most successful hackers, it reaches 90% or more.
— John McAfee
About
Average
Become
In computer circles, any unencrypted data is known as 'cleartext.'
— Barton Gellman
Any
Circles
Computer