WATCH: Hacker Explains The Easy Way To Hide Online

BROWSE THE INTERNET ANONYMOUSLY

On March 28, the Republican-controlled House of Representatives quietly voted to strike down an Obama-era Federal Communications Commission rule that prevented internet service providers from selling your personal information. After the resolution is signed into law by President Trump, big internet service providers such as Verizon, Comcast, and Charter will be able sell your online activity to the highest bidder. Soon, your browsing history, shopping habits, and just about anything else you do online could be made available to marketers.  

As it becomes increasingly difficult to remain anonymous online, it is not impossible. In the video above, Kevin Mitnick, author of “The Art of Invisibility,” shows Tech Insider one tool we can all use to protect our identities online. 

VIDEO: 

Source: Tech Insider

Topics: Speaking Engagements, The Art of Invisibility, exit node, HTTP, Verizon, Charter, Comcast, encryption, cyber security, Federal Communications Commission, HTTPS Everywhere, internet, internet service providers, IP address, Ross Ulbricht, selling personal information, Silk Road, SSL version, Tor, anonymity online, Onion Router, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›

Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read more ›
tech-texture-bg