Be online without leaving a trace.
Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.
Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famousand formerly the US government's most wantedcomputer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security.
Invisibility isn't just for superheroesprivacy is a power you deserve and need in the age of Big Brother and Big Data.
|Publisher:||Little, Brown and Company|
|Product dimensions:||6.40(w) x 9.30(h) x 1.20(d)|
About the Author
Kevin Mitnick has been the subject of countless profiles published and broadcast throughout the world. Mitnick's leading penetration-testing team is highly respected and sought after for its security services by the world's top corporations and governments. The company he founded, Mitnick Security Consulting LLC, has clients that include dozens from the Fortune 500 and many nations across the globe. Mitnick is the bestselling author of Ghost in the Wires, The Art of Intrusion, and The Art of Deception. He lives in Las Vegas and travels the world as the top keynote speaker on cybersecurity.
Table of Contents
Foreword Mikko Hypponen ix
Introduction: Time to Disappear 3
Chapter 1 Your Password Can Be Cracked! 11
Chapter 2 Who Else Is Reading Your E-mail? 30
Chapter 3 Wiretapping 101 52
Chapter 4 If You Don't Encrypt, You're Unequipped 67
Chapter 5 Now You See Me, Now You Don't 78
Chapter 6 Every Mouse Click You Make, I'll Be Watching You 91
Chapter 7 Pay Up or Else! 112
Chapter 8 Believe Everything, Trust Nothing 129
Chapter 9 You Have No Privacy? Get Over It! 144
Chapter 10 You Can Run but Not Hide 165
Chapter 11 Hey, KITT, Don't Share My Location 179
Chapter 12 The Internet of Surveillance 199
Chapter 13 Things Your Boss Doesn't Want You to Know 215
Chapter 14 Obtaining Anonymity Is Hard Work 232
Chapter 15 The FBI Always Gets Its Man 256
Chapter 16 Mastering the Art of Invisibility 262
Most Helpful Customer Reviews
In this age of government and corporate online surveillance, being anonymous while online is becoming more and more important. This book, from "the most famous computer hacker in the world" (according to Publishers Weekly) gives some pointers. In this day and age, anyone who still uses "password" or "12345" for their computer password should be ashamed of themselves. Change that password to a long and random string of letters and numbers, like twenty or twenty-five characters long. Write it down, or use a password management program, and frequently change it. If you are on a public wifi connection, like at the local library or coffee shop, do not do any online banking or e-commerce. It is very easy for a hacker to get your information, or send you to a site that looks legitimate but is not legitimate. If you are using anyone's computer, other than your own, it is a very good idea to delete the browser history, and reboot or shut off the computer before you leave it. Did you know that many printers, including work printers, have a hard drive that records everything that was printed? Save the printing of personal items, like medical test results or your credit report, until you get home. You can be sure that your boss is keeping a close eye on your internet usage, even during your lunch hour. For anyone traveling to the US, even American citizens returning from overseas, border authorities have the right to seize your laptop or cellphone, and keep it for as long as they want, searching through files. It is possible to use "strong" encryption on any personal files, store those files securely in the cloud, then wipe, not just delete (there is a difference) those files from your computer, and re-download them later. Parts of this book may be too technical for the average reader. The rest of the book may be considered common knowledge, but it certainly bears repeating. It is very much recommended.