Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.

The Art of Invisibility

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Audiobook
1 of 1 copy available
1 of 1 copy available
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility" — online and real-world tactics to protect you and your family, using easy step-by-step instructions.
Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.
The world's most famous — and formerly the US government's most wanted — computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security. Invisibility isn't just for superheroes; privacy is a power you deserve and need in the age of Big Brother and Big Data.
  • Creators

  • Publisher

  • Release date

  • Formats

  • Languages

  • Reviews

    • AudioFile Magazine
      Kevin Mitnick, the world's most famous and infamous hacker, uses many real-life case studies to explain how to to achieve greater online privacy. In a gruff timbre and matter-of-fact tone, narrator Ray Porter walks listeners through the details of avoiding malicious hackers and their related schemes. Porter provides an assertively controlled, well-paced journalistic performance. Disappointingly, though, Mitnick's suggestions range from the easy to grasp, such as employing stronger passwords, to the arcane, such as using dual and tertiary identity verification. The audiobook is eye-opening and scary. It's likely to fascinate, but listeners may finish it without a clear idea of how to go about improving their everyday cybersecurity. W.A.G.. © AudioFile 2017, Portland, Maine
    • Library Journal

      October 1, 2016

      Once on a three-year run from the FBI for his seemingly magical hacking abilities, as described in his over 100,000-copy best-selling memoir, Ghost in the Wires, the reformed Mitnick here gives step-by-step instructions on how we can protect ourselves from online invasion. With a 75,000-copy first printing.

      Copyright 2016 Library Journal, LLC Used with permission.

    • Kirkus

      December 15, 2016
      A highly useful handbook for how not to be seen--online, anyway. Think your data and identity are safe because you've got an eight-character password that isn't "God" or "1234"? Guess again, says cybersecurity expert Mitnick (Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, 2011, etc.). In a world where your smart TV can spy on you and your cellphone can reveal your location to any party with the ability to download tracking software, the odds are that your data is...well, compromised is the least of it. Furthermore, the American government has a rubber stamp for getting at your data, even in the days after Edward Snowden--whom the author mentions at several points--pointed out how much data the government already has. One step in the right direction is to use encryption software such as PGP ("pretty good privacy") to keep your email secure. However, warns Mitnick after a discussion refreshingly short on technical arcana if still a little daunting, "to become truly invisible in the digital world you will need to do more than encrypt your messages." Among the other techniques he suggests are using a passphrase instead of a password, made up of information only you can know, behind a virtual private network, encrypted phone calls, and two-factor authorization, all geeky things that Mitnick describes in admirably clear detail. Other tricks: use a reloadable gift card behind an email address used only for that purpose for online shopping, if you must shop online at all. Along the way, Mitnick describes how David Petraeus was caught in electronic flagrante, how Silk Road got taken down, and how he himself got nabbed. You don't have to be a paranoiac to have enemies, and you don't need to be an outlaw to want to keep your personal information personal. Though with more than a whiff of conspiracy theory to it, Mitnick's book is a much-needed operating manual for the cyberage.

      COPYRIGHT(2016) Kirkus Reviews, ALL RIGHTS RESERVED.

Formats

  • OverDrive Listen audiobook

Languages

  • English

Loading