WATCH: Hacker Explains The Easy Way To Hide Online

BROWSE THE INTERNET ANONYMOUSLY

On March 28, the Republican-controlled House of Representatives quietly voted to strike down an Obama-era Federal Communications Commission rule that prevented internet service providers from selling your personal information. After the resolution is signed into law by President Trump, big internet service providers such as Verizon, Comcast, and Charter will be able sell your online activity to the highest bidder. Soon, your browsing history, shopping habits, and just about anything else you do online could be made available to marketers.  

As it becomes increasingly difficult to remain anonymous online, it is not impossible. In the video above, Kevin Mitnick, author of “The Art of Invisibility,” shows Tech Insider one tool we can all use to protect our identities online. 

VIDEO: 

Source: Tech Insider

Topics: Speaking Engagements, The Art of Invisibility, exit node, HTTP, Verizon, Charter, Comcast, encryption, cyber security, Federal Communications Commission, HTTPS Everywhere, internet, internet service providers, IP address, Ross Ulbricht, selling personal information, Silk Road, SSL version, Tor, anonymity online, Onion Router, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

AI Voice Cloning: What It Is, and How to Detect Threats

Artificial Intelligence (AI) has reshaped our lives, speeding up learning, content creation, and communication. But with innovation comes a new risk: ..

Read more ›

3 Types of Hacking Seen In 2024 and Predictions For 2025

Threat actors are typically after two things from your business: data or money. Usually, they’re motivated by both, as data can help them cash in at t..

Read more ›

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›
tech-texture-bg