BOOK REVIEW: Safe or Sorry?

Former hacker makes a dismal account of your online privacy in the era of tech giants soaking up all our private information. Simple precautions, however, might do a lot of good.

The Art of Invisibility
Kevin Mitnick
Little, Brown and Company, USA, 2017

Internet privacy

Being invisible on the web almost sounds like utopia. Most people have accepted that every click is stored by tech giants like Google. If you’ve read my articles, you know by now that not just browsing is stored but also GPS locations and Wi-Fi networks you encounter.

Former hacker Kevin Mitnick, shares his inside knowledge in The Art of Invisibility; an upsetting look into the world of online privacy. But why even bother to protect yourself from online tracking? What can companies do with all the gathered information of you and others using their services?

Read the whole review here.

Source: Modern Times Review

Topics: Speaking Engagements, The Art of Invisibility, PGP, data brokers, data sales, Google Talk, GPG, online privacy, online safety, OTR, predicting human behavior, protecting privacy, Signal, Tails, Tor, World Privacy Forum, AOL, Big Data, Kevin Mitnick, MSN Messenger

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›

What You Get When You Invest in Social Engineering Testing with Mitnick Security

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Mitnick Security: Ransomware Awareness Training

Ransomware is a type of malware that prevents accessibility to either a single computer or an entire network until a ransom is paid. This can result i..

Read more ›
tech-texture-bg