Try free for 2 months
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged Audiobook
- Categories: Computers & Technology, History & Culture
Add to basket failed.
Add to Wish List failed.
Remove from Wish List failed.
Follow podcast failed
Unfollow podcast failed
Listen with a 2 month free trial
Buy Now for $43.43
No valid payment method on file.
We are sorry. We are not allowed to sell this product with the selected payment method
People who bought this also bought...
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Oldie but goodie
- By JayZee on 23-06-2021
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
i feel scammed now
- By Marko on 13-01-2020
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
A very interesting listen
- By I. Larsen on 23-07-2020
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
informative and etnertaining
- By Alan wade on 18-12-2019
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it. In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen.
-
-
Really wanted to enjoy this
- By Nick on 27-02-2020
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Oldie but goodie
- By JayZee on 23-06-2021
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
i feel scammed now
- By Marko on 13-01-2020
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
A very interesting listen
- By I. Larsen on 23-07-2020
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
informative and etnertaining
- By Alan wade on 18-12-2019
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it. In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen.
-
-
Really wanted to enjoy this
- By Nick on 27-02-2020
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
Permanent Record
- By: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, 29-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email.
-
-
absolutely amazing
- By daniel on 06-11-2019
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Very Interesting
- By Joanne on 14-07-2021
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
A motivational boost to be an ethical hacker
- By Kindle Customer on 22-06-2022
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
struggled with the narration
- By shanna daly on 20-06-2022
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- By: Brian Krebs
- Narrated by: Christopher Lane
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
-
-
Thoroughly enjoyable!
- By Al Ganz on 30-05-2018
-
Social Engineering
- The Art of Human Hacking
- By: Paul Wilson - foreword, Christopher Hadnagy
- Narrated by: A. T. Chandler
- Length: 14 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
Good introduction to Cybersecurity domain.
- By Anonymous User on 16-10-2021
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.
-
-
A Thrilling Eye-Opener
- By Jason on 20-05-2017
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
US point of view but not overly American
- By Anonymous User on 28-07-2020
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break in and scamper through the world’s computer networks invisibly until discovered. One of the most coveted tools in a spy's arsenal, a zero day has the power to tap into any iPhone, dismantle safety controls at a chemical plant and shut down the power in an entire nation - just ask the Ukraine. Zero days are the blood diamonds of the security trade, pursued by nation states, defence contractors, cybercriminals and security defenders alike. In this market, governments aren’t regulators; they are clients.
-
-
Unfortunate mispronouncing
- By Anonymous User on 16-05-2022
-
Computer Programming and Cyber Security for Beginners
- This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals
- By: Zach Codings
- Narrated by: Donald Cuddington
- Length: 21 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
With the tech industry becoming one of the most trending fields in the job market, learning how to program can be one of the most important and meaningful skills. This book is meant to introduce people who have no programming experience to the world of computer science and machine learning. This book won’t make you an expert programmer, but it will give you an exciting first look at programming and a foundation of basic concepts with which you can start your journey learning computer programming and machine learning.
Publisher's Summary
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data.
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility". Mitnick is the world's most famous - and formerly the most wanted - computer hacker. He has hacked in to some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.
In The Art of Invisibility Mitnick provides both online and real-life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes - privacy is a power you deserve and need in this modern age.
More from the same
What listeners say about The Art of Invisibility
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Joel
- 22-02-2017
Mind Blowing
A practical guide written with mind blowing detail and clarity! A must read for anyone who values their privacy. Brilliantly narrated.
3 people found this helpful
-
Overall
-
Performance
-
Story
- Jared Neaves
- 14-02-2019
Great book, even better narration.
I'm a cybersec student and found while this confirmed most of what I knew the anecdotes to be pretty entertaining. I would recommend it to all my friends and family. Ray Porter is now my favourite narrator of all the audio books I've ever listened to, very compelling listening.
2 people found this helpful
-
Overall
-
Performance
-
Story
- Scott
- 24-07-2018
A novel I think everyone should read
In this day and age I think people too easily overlook online personal security. This book talks about how to stay safe online by keeping your data from prying eyes. With the recent NSA/Snowden and Facebook scandals, no one can be one-hundred percent sure where their data is going, which is why it's very important to lock as much of it down as you can. I have read a number of other books written by Kevin Mitnick and I can say; all of them have had compelling information. They're a real eye opener into today's surveillance state society. Everyone can listen, from complete technology novices to the more advanced and there's something to be had either way. I can definitely recommend The Art of Invisibility with a big thumbs-up!
2 people found this helpful
-
Overall
-
Performance
-
Story
- JayZee
- 18-04-2020
Mandatory reading for anyone in IT/CyberSec
Easy reading informative book to get you thinking. It is one of those books that should be in every IT/Cyber Security student or professional should have in their library.
1 person found this helpful
-
Overall
-
Performance
-
Story
- Justin
- 17-02-2020
a surveillance avoidance guide book
books abit dry for me.
but if ur into avoidance from surveillance this book is for u
1 person found this helpful
-
Overall
-
Performance
-
Story
- John
- 29-11-2021
If this doesn't scare you, it should.
While a couple of years old there is enough to make this highly relevant listening.
-
Overall
-
Performance
-
Story

- James C
- 14-10-2017
Limited value for the average person
Mitnik's book has a handful of decent ideas for how the average person can better protect their privacy, but this content isn't worth the 9 hour listen, much of which is just rambling about the countless ways in which our lives and activities can be monitored in the digital age. Mitnik comes across as a bit full of himself, which would be fine if the content was more worthwhile.
It's unclear at what demographic the book is targeted, as some of the stuff is applicable to everyone, but he also spends a lot of time on topics that would seem to only be of interest to criminals or the truly paranoid (hiring a homeless person to buy you a throw-away phone, which you then use to establish an anonymous identity, and so on).
Save yourself the read...below are the main ideas that seem relevant to most people, you can probably find better info on these elsewhere than this book:
- Your personal data (hometown, mother's maiden name, etc.) is probably compromised, so don't use it as your "Secure Questions" for accounts. Instead, develop a list of specific, fake answers to these questions.
- Use 12-20 digit passwords on your accounts, don't use the same password for different stuff
- Establish Two Factor Authentication on all your accounts/devices, using Google Authenticator if available
- Use a dedicated device for accessing your most sensitive (financial) acccounts
- Ensure your router has updated firmware and isn't configured to use outdated WPA encryption
811 people found this helpful
-
Overall
-
Performance
-
Story

- Amazon Customer
- 20-06-2017
Audio is Not the Right Format
After about an hour I've decide to return the book and buy a paper or Kindle copy instead.
A line in an audio book that says, "For more instructions... see page 117" is about as clear of an indicator as you can get that audio is the wrong format. It's a pity because I really like both the content and the performance, but to make practical use of the book, I need something I can read.
218 people found this helpful
-
Overall
-
Performance
-
Story

- david
- 21-11-2017
Maybe reading the book is better
-This book works a lot like a checklist and a guide as to how to be invisible online.
It obviously goes into details about what is what, and the reason to be invisible by citing different cases, such as the Snowden files, bitcoin ransoming, viruses etc, and then HOW you can avoid such things, or gain access to certain things with things that the author suggests.
-The author DOES actually suggest what to use, and how to use it, and at the end, a full step by step solution to be invisible online. In this, i think it would honestly be better to read it, and then you can come back to it later.
-In audio format, although many things were indeed interesting, its difficult to come back to easily as audio chapters are not marked.. or of course you have to take notes going all the way through.
-I'm happy to have listened to it, and i found many of the things worthwhile, but i probably wouldn't listen to it again.
28 people found this helpful
-
Overall
-
Performance
-
Story

- John Ryan
- 28-06-2017
Enough bits to be worth the read; overly focused on wrong threat models
If you're like me, you came to this book just wanting to protect your privacy. You'll get some good ideas from Mitnick. However, too much of the book was aimed at the unlikely reader: someone truly wanting to cover their tracks from government surveillance... and then only in the final chapter did he truly pull together a formula for establishing enough identity encryption to do so.
There are some entertaining stories you'd hope from an ex-Black Hat. He kept what could be a dry topic fun to read.
Ray Porter (narrator) did a great job of adding emphasis to enliven the book. However, it was disappointing when he fully mispronounced essential terms; it immediately drained creditability from the author's voice. Also, Porter's emphasis was a bit thick, so much so that he made Mitnick sound down right bratty and annoying.. I've seen Mitnick in interviews and he doesn't come across that way to me.
Technically, you will walk away with a couple of good tips and product recommendations as well as understanding why they are good choices.
94 people found this helpful
-
Overall
-
Performance
-
Story

- Travis
- 07-02-2018
Good overall.
Unfortunately, btc and other digital currencies now count as property and are therefore taxable. So, if you follow the advice given you will be guilty of tax evasion.
12 people found this helpful
-
Overall
-
Performance
-
Story

- J. Pobst
- 22-09-2017
An uninteresting how-to of extreme measures
Any additional comments?
The interesting parts and the actionable advice that most people would find reasonable (like using a password manager) could be summed up in maybe 10 minutes. The rest was advice that most people would find absolutely unreasonable to incorporate into their lives (e.g., pay a stranger to purchase prepaid gift cards that you can use to buy a mobile hotspot, whose mac address you'll change every time you use it, or set up multiple email accounts to launder bitcoins,...). If you're a big time criminal, some of these things are worth you time, but for most of us they aren't.
33 people found this helpful
-
Overall
-
Performance
-
Story

- aaron
- 29-03-2017
Authors, PLEASE Hire Ray Porter to Read Your Books
This is the first nonfiction book I've listened to Ray Porter read. WOW! What an experience! Mitnick is a fantastic writer to begin with, not boring at all, but Porter takes his words to the next level. I never found myself drifting off, thinking about other things. I was 100% present in the book throughout. This is a rarity, as some readers are an absolute chore to stay tuned in to. Not Ray!
I encourage ALL nonfiction writers to start hiring Ray Porter to read their books. He adds an excitement to academic tomes that is welcome and refreshing.
As for the book itself, it's OUTSTANDING. The other reviews praising it are spot on. Mitnick is WAYYYYYYYYYY ahead of the techno-curve, and wants you to be as well. Buy this book for its practical advice. Enjoy the book because of RAY!
110 people found this helpful
-
Overall
-
Performance
-
Story

- Andrew
- 10-03-2017
very good overall
Great information, good stories and examples as proof, and an enjoyable audiobook overall. there is a lot of great information in here both for the casual web surfer and rmailer, as well as for even the most experienced sys admin or sys eng.
24 people found this helpful
-
Overall
-
Performance
-
Story

- Max Casey
- 18-03-2017
Mitnick delivers yet again
I'm a 20 year IT admin, and know a lot about many of the technologies Kevin discusses in this book, but the real gold is how he explains the how's, whys, gotchas and more when it comes to online privacy. Unless your name is Edward Snowden, you should get this book. You will love it.
43 people found this helpful
-
Overall
-
Performance
-
Story

- Lance
- 14-03-2017
Excellent Book!
Mitnick does an excellent job balancing technical jargon and audience engagement. He masterfully simplifies complex subject matter and explains cyber security concepts in a way that the general populous can understand and learn from.
I highly recommend listening through once for an overview of the ideas, and then at least once more if you plan on putting his words into practice.
22 people found this helpful
-
Overall
-
Performance
-
Story

- Dionysis Zindros
- 07-12-2019
Bad book
This book is bad. I've read Mitnick's two previous books and they were interesting, exciting, and enjoyable. This book is not.
It provides a series of obvious tips such as the recommendation of using a password manager. Furthermore, it rambles endlessly in fearmongering in a manner that aims to scare without informing. One example is that the book implies that nation-states have the power to brute-force 25-character passwords consisting of lower case, upper case letters and numbers. To our current knowledge, this process would take more than the age of the universe to complete, even if all nation states combined their efforts and their best computers to break your own personal password.
As such, I found the book an attempt to spread fear, misinformation, and doubt. Lastly, Kevin comes off as completely full of himself, preaching unscientifically and often without explanation. The book goes on and on with boring clichés and pretentious emphases by the narrator which are quickly tiresome.
While some of the tools recommended are good (keepass and the IP masking techniques), overall you are better off searching for this information online in less sensational publications.
16 people found this helpful
-
Overall
-
Performance
-
Story

- Paul c
- 12-12-2018
Interesting read
A must read for anyone who uses the internet old or young. A good insight into the negatives aspects of internet security or lack of. 10 out of 10
3 people found this helpful
-
Overall
-
Performance
-
Story

- peter
- 23-08-2019
Eye opening !!!
Not even half way through this book yet, but I love it and highly recommend to everybody. Shows just how little the average person is informed on their own personal security. We become so complacent that we just trust everything and we are being exploited on every level! You will not regret purchasing this book.
2 people found this helpful
-
Overall
-
Performance
-
Story

- Anonymous User
- 13-09-2020
absolutely brilliant
fantastic read that has some valuable points and I learned so much to do with security thanks to this and soon I might just give it all ago. 10/10 would recommend to a computer need like myself.
1 person found this helpful
-
Overall
-
Performance
-
Story

- Peter
- 06-06-2020
Practically perfect in every way.
If you have an interest in Annonimity or online and general security, You need this book.
The world is elvolving in potentially dangerous and sinister ways. The book delves into the insidious methods that are turning people and their data into global commodities among other serious issues.
1 person found this helpful
-
Overall
-
Performance
-
Story

- Sebastian Gergely
- 11-11-2021
Interesting
People don't realise how much they give away when on social media and not just.
-
Overall
-
Performance
-
Story

- TopRock
- 29-09-2021
What a fantastic book
This is one of the best books I've ever read. It's almost like the Swiss army knife of how to stay under the radar in the modern world - if you ever needed to.
-
Overall
-
Performance
-
Story

- Paddy brennan
- 05-12-2019
amazing
love this book such a great insight to keeping you safe online and in which way to do it love it
-
Overall
-
Performance
-
Story

- R W.
- 27-11-2019
Great listen
An good read if you're technically minded and have an interest in Internet security.
Might be a harder listen for a lay person.
-
Overall
-
Performance
-
Story

- Andris Racko
- 06-11-2019
Clear, stright message delivered fast and easy!
Wery good book, wery clear and understandible.
Delivered in fast and entertaining way!
Makes as to think how we continue to move around in the "space".
👍
16 Best Audiobooks by Aboriginal Authors
Across genres, there’s no shortage of brilliant titles from Aboriginal and Torres Strait Islander writers of Australia.



16 Audiobooks Full of Life Hacks to Live By
Looking to improve yourself mentally, physically, emotionally and spiritually? This is where to start.



14 Feel-Good Audiobooks to Brighten Up Your Day
The Audible library is packed with feel-good audiobooks that will lighten the soul and fill the heart with joy.


