BOOK REVIEW: Hacker knows best: Privacy tips from Kevin Mitnick

This security expert knows all the tricks for stealing your personal information. His new book tells you how to keep your data safe.

Kevin Mitnick knows all the ways your privacy could be violated through your phone, computer and tablet.

An incorrigible hacker since he was a teenager, Mitnick eventually spent almost five years in prison for computer crimes. Now on the right side of the law, Mitnick works as a consultant who turns his skills on paying customers who want to know where their vulnerabilities lie.

Usually, he can find a way to get to a business' crown jewels, whether that be its intellectual property or the personal data of their customers. But you're vulnerable, too, he says.

Mitnick's new book aims to help everyone -- from the everyday internet users to the hardcore paranoid -- do a better job of keeping personal information private. "The Art of Invisibility," released Tuesday, covers a range of topics that some readers might find overwhelming. From creating secure passwords to sending encrypted email, there's no dearth of ways you can try to keep your data to yourself.

There's even a section on protecting your data from Customs and Border Patrol when you enter the United States.

Read the full article here.

Source: CNET

Topics: Samsung, The Art of Invisibility, encrypted emails, HP, computer security consultant, cloud service, Dell, internet, keynote speaker, LastPass, privacy protection, secure passwords, Signal, TouchID, Apple, password manager, personal data, protect personal information, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

PCI Testing: Everything You Need To Know

Penetration testing is crucial for businesses to help ensure that their security posture will stand against threat actors. For businesses that handle ..

Read more ›

The 4 Phases of Penetration Testing

So, you’ve done your research on penetration testing and are ready for the pentest engagement. But before you choose just any pentesting vendor, it’s ..

Read more ›

What is Web Application Penetration Testing?

Is your company in the process of developing a new application? There are a lot of moving parts involved in developing and deploying cutting-edge appl..

Read more ›
tech-texture-bg