Kevin Mitnick - The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Kevin Mitnick - The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.

Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security.

Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.


Comments


[12 Points] StuxianNightmare:

Just finished this book...

Its great as a summation- if youve been around these parts for a while you probably already know a good quarter of the book

-Covers the issues with cellphones of all flavors quite well, how to avoid pinging towers, how to get a cell phone anonymously etc

-Talks about anon emails and remailers

-Doesnt dive too deep in most topics (great for the tecnically uninclined) but gives you a practical “do this instead of that”

-Specifically uses real world drug dealing opsec failures periodically, for example a man with 12 burner phones dealing 500 million dollars worth of ecstasy was caught after calling a journalist... they pinged his location and identity

-Obvious stuff you “should” already be doing: using long passwords, changing passwords, etc

-Horror stories of individuals at security conferences compromising just about every digital hardware that has a radio: smart appliances rf cars you name it

-Router security

-Pgp

-does not talk about OS’s to use too much other than a brief USE TAILS

-staying anonymous while traveling

Useful quick read


[4 Points] blacksheepk:

Printed using school printer because of the sheer amount of paper and toner, can't wait to read this!

Yes I know I can save paper by reading the PDF, but the school charges me in the tuition for number of pages I can print per semester regardless on whether or not I use it


[2 Points] Avengerhack:

Good hacker and a great author.

A personal favorite is "The Art of Deception"


[1 Points] Vendor-Bubblehash:

Nice!


[1 Points] None:

Thanks for the share, definitely gonna give this one a read.


[1 Points] elfer90:

ayeee


[1 Points] None:

Kevin Mitnick, Kevin Mitnick, Kevin Mitnick! didn't work =(


[1 Points] _brainfuck:

Really thanks, I've been looking for this ebook for some time to add it to my collection.


[0 Points] Chipklaatu:

World's most famous hacker? Yea like 20 years ago..

Good read tho.