BOOK REVIEW: The Art of Invisibility - on the Internet (German)

Kevin Mitnick takes a look at the current situation of privacy on the Internet and gives practical tips on how users can effectively protect themselves. 

How can you preserve your privacy without completely disconnecting the Internet? New book by notorious hacker and social engineer Kevin Mitnick attempts to tackle this issue from a practical standpoint. The result is an interesting work that shows realistic scenarios and practical tips without losing too much in technical details.

Kevin Mitnick is probably one of the most dazzling figures in the IT security environment. He was one of the first hackers and social engineers to gain a reputation worldwide - also because many found the punishment for his hacks too harsh. Since ending his detention in 2000, Mitnick has not only made a name for himself as a security consultant, he also wrote several books and acts as a speaker.

" The Art of Invisibility" -  on the Internet (Mitp-Verlag, 24.99 Euro, ISBN: 9783958456358) is the third book in his "The Art of the" series. Mitnick is thus clearly aiming for the current zeitgeist. Data from Internet users are collected, evaluated and analyzed to an unprecedented extent. In addition, more and more states are enacting rules on what information can be collected, enriched and exchanged where and how.

For the full review, please visit here.

Source: Security-Insider

Topics: Social Engineering, Speaking Engagements, The Art of Invisibility, data theft, hackers, Internet anonymity, IT security, security consultant, cyber crime, protecting data, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›

Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read more ›
tech-texture-bg