WATCH: How to shop online without being tracked by big tech companies

Is it possible to shop online without allowing any major tech company to track the purchase back to you? There are a few ways, but with hidden trackers on most websites -- and with companies making billions off our information -- trying to hide is easier said than done. CBS News correspondent Tony Dokoupil put it to the test with Kevin Mitnick.

"Now, you're best known as a hacker," Dokoupil said.

"Well, a security expert," Mitnick said with a laugh.

Mitnick spent five years behind bars after stealing information from major companies like Motorola and Nokia. During a nationwide manhunt in the mid-1990s, he eluded capture for more than two years. He now focuses on protecting corporate security, sharing tips for avoiding surveillance in his book, "The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data."

"People want to protect their privacy. … And people will go to the trouble of anonymizing themselves to protect their privacy," Mitnick said.

He said using a "privacy" or "incognito" mode on your computer browser is not enough.

"When you normally go on your computer at your home or office, you're assigned an IP address by your internet service provider. And it's quite easy to, you know, track that type of information," Mitnick said.

So what steps did we take to avoid being tracked? It started at the convenience store.

Read the full article and watch the video here.

Source: CBS NEWS

Topics: security expert, Speaking Engagements, The Art of Invisibility, Tony Dokoupil, hot spot, burner phone, anonymity online, prepaid credit card, privacy, Kevin Mitnick, new online identity

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg