Cyber Security Articles & News

BOOK REVIEW: Kevin Mitinick: The Art of Invisibility

A highly useful handbook for how not to be seen—online, anyway.

Think your data and identity are safe because you’ve got an eight-character password that isn’t “God” or “1234”? Guess again, says cybersecurity expert Mitnick (Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, 2011, etc.). In a world where your smart TV can spy on you and your cellphone can reveal your location to any party with the ability to download tracking software, the odds are that your data is…well, compromised is the least of it.

Furthermore, the American government has a rubber stamp for getting at your data, even in the days after Edward Snowden—whom the author mentions at several points—pointed out how much data the government already has. One step in the right direction is to use encryption software such as PGP (“pretty good privacy”) to keep your email secure. However, warns Mitnick after a discussion refreshingly short on technical arcana if still a little daunting, “to become truly invisible in the digital world you will need to do more than encrypt your messages.”

Among the other techniques he suggests are using a passphrase instead of a password, made up of information only you can know, behind a virtual private network, encrypted phone calls, and two-factor authorization, all geeky things that Mitnick describes in admirably clear detail. Other tricks: use a reloadable gift card behind an email address used only for that purpose for online shopping, if you must shop online at all. Along the way, Mitnick describes how David Petraeus was caught in electronic flagrante, how Silk Road got taken down, and how he himself got nabbed.

You don’t have to be a paranoiac to have enemies, and you don’t need to be an outlaw to want to keep your personal information personal. Though with more than a whiff of conspiracy theory to it, Mitnick’s book is a much-needed operating manual for the cyberage.

Read this book eview and more on

Source: KIRKUS

Topics: Smart TV, The Art of Invisibility, two factor authorization, Edward Snowden, PGP, computer security expert, cell phones, email security, encrypting messages, keynote speaker, passphrase, password security, security awareness training, Silk Road, David Petraeus, reloadable gift card, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What is a Penetration Testing Framework?

Penetration testing services are performed by cybersecurity companies to help find weaknesses in an organization's network, internal systems, and show..

Read more ›

What To Expect During Red Team Operations

Companies are producing an exponential amount of data every day and by 2025, it’s estimated that there will be about 181 zettabytes of data. As your o..

Read more ›

4 Considerations When Choosing Between Pentesting Companies

As business models continue to evolve the need for cybersecurity measures is more necessary than ever before.

Read more ›