Cyber Security Articles & News

BOOK REVIEW: Safe or Sorry?

Former hacker makes a dismal account of your online privacy in the era of tech giants soaking up all our private information. Simple precautions, however, might do a lot of good.

The Art of Invisibility
Kevin Mitnick
Little, Brown and Company, USA, 2017

Internet privacy

Being invisible on the web almost sounds like utopia. Most people have accepted that every click is stored by tech giants like Google. If you’ve read my articles, you know by now that not just browsing is stored but also GPS locations and Wi-Fi networks you encounter.

Former hacker Kevin Mitnick, shares his inside knowledge in The Art of Invisibility; an upsetting look into the world of online privacy. But why even bother to protect yourself from online tracking? What can companies do with all the gathered information of you and others using their services?

Read the whole review here.

Source: Modern Times Review

Topics: The Art of Invisibility, PGP, data brokers, data sales, Google Talk, GPG, keynote speaker, online privacy, online safety, OTR, predicting human behavior, protecting privacy, Signal, Tails, Tor, World Privacy Forum, AOL, Big Data, Kevin Mitnick, MSN Messenger

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What is a Penetration Testing Framework?

Penetration testing services are performed by cybersecurity companies to help find weaknesses in an organization's network, internal systems, and show..

Read more ›

What To Expect During Red Team Operations

Companies are producing an exponential amount of data every day and by 2025, it’s estimated that there will be about 181 zettabytes of data. As your o..

Read more ›

4 Considerations When Choosing Between Pentesting Companies

As business models continue to evolve the need for cybersecurity measures is more necessary than ever before.

Read more ›