BOOK REVIEW: Hacker knows best: Privacy tips from Kevin Mitnick

This security expert knows all the tricks for stealing your personal information. His new book tells you how to keep your data safe.

Kevin Mitnick knows all the ways your privacy could be violated through your phone, computer and tablet.

An incorrigible hacker since he was a teenager, Mitnick eventually spent almost five years in prison for computer crimes. Now on the right side of the law, Mitnick works as a consultant who turns his skills on paying customers who want to know where their vulnerabilities lie.

Usually, he can find a way to get to a business' crown jewels, whether that be its intellectual property or the personal data of their customers. But you're vulnerable, too, he says.

Mitnick's new book aims to help everyone -- from the everyday internet users to the hardcore paranoid -- do a better job of keeping personal information private. "The Art of Invisibility," released Tuesday, covers a range of topics that some readers might find overwhelming. From creating secure passwords to sending encrypted email, there's no dearth of ways you can try to keep your data to yourself.

There's even a section on protecting your data from Customs and Border Patrol when you enter the United States.

Read the full article here.

Source: CNET

Topics: Samsung, The Art of Invisibility, encrypted emails, HP, computer security consultant, cloud service, Dell, internet, keynote speaker, LastPass, privacy protection, secure passwords, Signal, TouchID, Apple, password manager, personal data, protect personal information, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›

Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read more ›

Password Management Best Practices: How Secure Are Password Managers?

Password managers are convenient tools for storing, organizing, and accessing passwords. But are they safe from cyber attacks?

Read more ›
tech-texture-bg