The Art of Invisibility by Kevin Mitnick Book Review

The world’s most famous hacker Kevin Mitnick has a new book out titled The Art of Invisibility “The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data”. This book is a great reference book as well as great read with real eye-opening information about the world of security There is much you can learn from this book about protecting your privacy online, in your home and in public.

Kevin Mitnick grabs your attention right away in this book by diving into the world of privacy online talking about email security. Who can read your email and how to keep your email safe by encrypted email using PGP (Pretty Good Privacy) encryption. Kevin Mitnick then talks about keeping your physical laptop safe using hard drive encryption and goes into the different kinds of encryption software like Symantec PGP, Microsoft Bitlocker and many others in the security marketplace.

Kevin Mitnick explains the security of different browsers like Internet Explorer, Chrome, Firefox, and Edge. We get into using SSL websites and the important item of HTTPS for web browsing.  Kevin Mitnick then explains using browser extensions like https everywhere and Ghostery to keep you safe while accessing sensitive data online like shopping on amazon or doing your banking. The book gets into adjusting browser settings to block geolocation tracking and other intrusive data collection. Kevin Mitnick explains the differences between mobile browsing and desktop browsing, then dives into security on your mobile device. That chapter was a real eye opener for me to say the least.

Kevin Mitnick then explains about using a VPN (Virtual Private Network) to change your location and keep you’re online browsing safe. He warns about free VPNS and data logging that different services do when using a VPN. The book goes through two factor authentication for securing email, banking and other important accounts.

The book gets into browsing the web anonymous using the Tor browser and explains in depth how the Tor Onion browser works and the dark web. The book then gets into an in depth look at bitcoin and how it’s used as anonymous currency online. The bitcoin piece was interesting as that’s something I have very little experience with and gained much knowledge about after reading that chapter.

Kevin Mitnick speaks about using open networks at coffee shops and hotels. He gets into what attackers do to gather data on you using open wireless networks. Kevin Mitnick gets into securing your social media and Facebook settings to keep you safe from social media spying. The book dives into posting pictures online and how people use those pictures to find your location. He takes us deep into Facebook and Instagram and explain how attackers use those two social networks to organize social engineering attacks.

Kevin Mitnick explains header and metadata in emails and websites. Kevin Mitnick then explains geolocation data in pictures which was another eye opener. The book explains security in your house such as your Smart TV, smart phone and Amazon Echo that are always listening and recording which at times was scary to read.

I would give this book 5 out of 5 stars because it was such a great book, incredibility well written with a lot of great information. I bought the book both on Kindle and Audible. I have to say the audiobook version is well done with a great narrator. I would recommend this book to any technology professional or any person concerned about their privacy online.

Read this cool review and other interesting articles at the source.

Source: BOOK REVIEW: The Technology Geek

Topics: Speaking Engagements, The Art of Invisibility, VPN, PGP, Symantec PGP, encryption, brower security, desktop browsing, email security, Ghostery, laptop security, Microsoft Bitlocker, online privacy protection, Pretty Good Privacy, security, metadata, mobile browsing, Tor browser, virtual private network, wireless networks, bitcoin, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›