BOOK REVIEW: Be prepared (Afrikaans)

The Art of Invisibility

by Kevin Mitnick

Publisher: Little, Brown and Company

USA

A former hacker delivers a gloomy report about our privacy at a time when technology giants suck all information about you. Some simple precautions may be useful.

 

(Translated from Afrikaans using Google Translator)

Being invisible online sounds almost like an utopia. Most people have accepted that each click is being saved by technology giants like Google, and that not only our browsing is saved, but also GPS sites and Wi-Fi networks we're in.

Foster in the details. The former hacker Kevin Mitnick shares his insight into The Art of Invisibility ; a shocking look into the world of online business. But why do you care about protecting yourself from online tracking? What can companies do with the collected information about you and others who use their services? Let me give an example: A company called "Target" began sending pregnancy brochures to a family in the United States when they assumed that her daughter was pregnant. The father became furious, but his daughter later realized that she was actually pregnant, according to an article in the New York Times. The head of Target, Andrew Pole, is quoted in the article, explaining how his company identified 25 products that combined indicated pregnancy and probable term.

For the full review please visit the source.

Source: NY TID

Topics: surveillance, technology, The Art of Invisibility, Pam Dixon, data protection, encryption, keynote speaker, World Privacy Forum, Big Data, privacy, private data sales, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Redefining Your Enterprise’s Cyber Security Posture During Mergers & Acquisitions

With 3,205 data compromises occurring in 2023 alone, fortifying your enterprise’s cybersecurity posture is more important than ever.

Read more ›

Choosing a Penetration Testing Company for Mac-based Environments

Powering your business with Apple devices because of their reputable security and privacy features? You may be surprised to learn that while Apple dev..

Read more ›

AI in Cyber Security: Impacts, Benefits, and More To Be Aware Of

Artificial intelligence in cybersecurity has been a hot topic lately, especially with the rise of OpenAI’s ChatGPT. But does that mean it would make a..

Read more ›
tech-texture-bg