The Art of Invisibility
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wish list failed.
Follow podcast failed
Unfollow podcast failed
Buy Now for $28.27
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Ray Porter
-
Written by:
-
Kevin Mitnick
-
Robert Vamosi
-
Mikko Hypponen
About this listen
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data.
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility". Mitnick is the world's most famous - and formerly the most wanted - computer hacker. He has hacked in to some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.
In The Art of Invisibility Mitnick provides both online and real-life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes - privacy is a power you deserve and need in this modern age.
©2017 Kevin Mitnick (P)2017 Hachette AudioYou may also enjoy...
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Written by: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- By jesse b on 2022-05-20
Written by: Kevin Mitnick, and others
-
The Art of Deception
- Controlling the Human Element of Security
- Written by: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
Written by: Kevin Mitnick
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Written by: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Hard to get into
- By Blair C. on 2019-11-06
Written by: Joseph Menn
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- Written by: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.
-
-
A Must Read
- By Candace Sundbo on 2023-10-11
Written by: Bruce Schneier
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Written by: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- By Anonymous User on 2021-10-15
Written by: Nicole Perlroth
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Written by: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Okay
- By AmazonShopper on 2024-03-04
Written by: Christopher Hadnagy
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Written by: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- By jesse b on 2022-05-20
Written by: Kevin Mitnick, and others
-
The Art of Deception
- Controlling the Human Element of Security
- Written by: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
Written by: Kevin Mitnick
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Written by: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Hard to get into
- By Blair C. on 2019-11-06
Written by: Joseph Menn
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- Written by: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.
-
-
A Must Read
- By Candace Sundbo on 2023-10-11
Written by: Bruce Schneier
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Written by: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- By Anonymous User on 2021-10-15
Written by: Nicole Perlroth
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Written by: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Okay
- By AmazonShopper on 2024-03-04
Written by: Christopher Hadnagy
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Written by: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
Written by: Kevin Poulsen
-
Permanent Record
- Written by: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Just Magnificent
- By Nate on 2019-09-27
Written by: Edward Snowden
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Written by: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- By Jon on 2023-12-07
Written by: Kim Zetter
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Written by: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Nothing about Kali Linux
- By Anonymous User on 2020-01-11
Written by: Lance Henderson
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- Written by: Geoff White
- Narrated by: Geoff White
- Length: 8 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
If you love the podcast, buy this.
- By Amazon Customer on 2023-04-26
Written by: Geoff White
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- Written by: Christopher Hadnagy, Seth Schulman
- Narrated by: Christopher Hadnagy
- Length: 8 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
Written by: Christopher Hadnagy, and others
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- Written by: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
A very engaging read
- By Shep on 2024-10-18
Written by: Andy Greenberg
-
We Are All Targets
- How Renegade Hackers Invented Cyber War and Unleashed an Age of Global Chaos
- Written by: Matt Potter
- Narrated by: Matthew Waterson
- Length: 10 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Two years before 9/11, the United States was attacked by an unknown enemy. No advance warning was given, and it didn't target civilians. Instead, tomahawk missiles started missing their targets, US agents were swept up by hostile governments, and America’s enemies seemed to know its every move in advance. A new phase of warfare—cyber war—had arrived. And within two decades it escaped Pandora's Box, plunging us into a state of total war where every day, countless cyber attacks perpetrated by states and mercenaries are reshaping the world.
-
-
Stunning
- By Anonymous User on 2023-02-18
Written by: Matt Potter
-
Zero Day
- A Jeff Aiken Novel
- Written by: Mark Russinovich
- Narrated by: Johnny Heller
- Length: 9 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
An airliner’s controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction. At first, these random computer failures seem like unrelated events.
Written by: Mark Russinovich
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- Written by: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Mostly obvious, painfully amateurish writing.
- By Denis Robert on 2019-07-01
Written by: Gene Kim, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Written by: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- By Jake L.S. on 2020-01-18
Written by: Andy Greenberg
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- Written by: Lester Evans
- Narrated by: Michael Reaves
- Length: 3 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention.... Do you create tons of accounts you will never again visit? Does your password contain a sequence of numbers, such as “123456”? Do you automatically click all links and download all email attachments coming from your friends? This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.
-
-
Absolutely Amazing for my first audiobook
- By Kelly H on 2021-10-28
Written by: Lester Evans
What listeners say about The Art of Invisibility
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Blythe
- 2018-04-14
Information everyone should know
Kevin Mitnick, in case you aren’t familiar with the name, is a former hacker and convicted criminal now turned white-hat penetration tester - and author of several books about it. And as you can judge from the subtitle, not at all modest about it either. But undeniably a font of knowledge on the matter.
You may be aware that your actions online aren’t totally anonymous, but in the past few years changes to technology and to laws have made that drastically even less true, likely without you realizing. This book is a very useful eye-opener for everyone, whether you think you need it or not. Do you have “smart appliances” or tv in your home? Did you know you can go to jail for deleting your browser history even if you’ve done nothing wrong? Do you want to know how to minimize your risk online? This is a good overview and summary of all these and more.
Mitnick goes all the way to showing you how to be completely invisible online, which is a very difficult thing these days, but you can take away as much or as little of that as you need. Still, as he points out there are legitimate reasons why you might need to know this stuff. For example, escaping an abusive relationship (or talking to a friend who is). Going through a bitter divorce. Living in or travelling to a country with very restrictive internet rules. Need to travel overseas with a laptop or other device containing confidential data that you’re professionally obliged to protect (doctor/lawyer confidentiality for example, or company research secrets). This book will help you become aware of issues you may not even know about, and how to deal with them to whatever level you need.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Infinity0
- 2021-03-25
Good for its time
This would have been good....4 years ago. Its mostly pretty obvious and outdated information now.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Sascha Uncia
- 2023-01-13
Mixed Feelings.
I have mixed feelings about the book, and it wasn't quite what I was expecting. I'll rate it four stars because I think it's good content but probably just not for me.
The first thing I noticed is that the advice given either seems to fall into two categories. The very basic, such as password strength guides and tips, how passwords are broken, password managers, drive encryption, browser cache and private browsing, recommended addons, etc. These are great for someone who is new to computer security, but ultimately I didn't learn much from it.
The second category is the very advanced, specific, and involved. Things like getting burner phones, separate devices to separate your anonymous presence from your real world identity, bribing strangers to purchase gift cards on your behalf, TOR onion routing, laundering bitcoin, plausible deniability, etc. All of these things are rather extreme steps, probably only useful to a foreign affairs reporter or whistleblower, not greatly useful to the average person trying to minimize their online footprint. Worse is that a lot of it is presented as "this is what this infamous criminal did wrong and got him caught, and here's what he should have done", this could be Mitnick leaning into the romanticized hacker archetype or his 'badboy' reputation, but it gives the book a certain... Shady vibe? Like saying that it's useful to reporters for plausible deniability while sounding like the advice was intended for an audience with more questionable intent. Idk, pet peeve maybe, but nonetheless I doubt most people would benefit from or understand this half of the books advice.
There are a couple of chapters in the middle that have more useful general advice; For example, how sites track you, example cases, and what to do about it. These are more just case studies highlighting how electronic tracking in the modern world has spiraled out of control and why you should care about privacy.
Lastly, although the book is only a few years old it's already starting to show its age. As rapidly evolving and ever-changing technology marches on, I expect that in a few more years a good portion of the specific advice will be outdated.
So if you've done any IT-Sec before you probably won't learn much new, and the more extreme steps / advice are unlikely to be beneficial for most people. Take these things into consideration and decide whether this book is right for you.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- David S Lugg
- 2018-09-19
Good content, good narration.
Very good content from Kevin in this book. Even though I'll probably never get to the point where I need to exercise this information, it's good to have it as a resource. #Audible1
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- KenP
- 2022-02-26
Excellent information to protect your privacy.
Excellent information on the many ways you are vulnerable to data, privacy and sensitive information attacks.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Roberta W
- 2022-10-05
Good but not his best
Not nearly as Mitnick’s Ghost in the Wires (it was FANTASTIC and full of real life suspense), but still interesting. Lots of practical information.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Mr. C
- 2018-02-27
Good book but
If you have some knowledge of privacy tools it may be redundant. I learned some new things but was expecting better stories and technology.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful