Introduction: the groups behind cyber attacks
Phishing
Email phishing
Business email compromise
Phishing phnone calls
Caller ID spoofing
Phishing messages
QR code phishing
Hybrid phishing
Protect against phishing
Notes
Account compromise
Passwords
SMS 2FA
Stronger 2FA
2FA fatigue
Password managers
Advice for securing your accounts
Notes
Vulnerabilities and exploits
Zero-day vulnerabilities
N-day vulnerabilities - A vacuum of patches
The vulnerability ecosystem
Vulnerabilities and different devices
Managing vulnerabilities and mitigating exploits
Romance fraud
The psychological strategy of romance scammers
When you are the catfish
Social media and romance scams
The psychology of romance fraud
The impact of romance fraud on victims
Sextortion: image-based sexual abuse
Spotting romance fraud red flags and staying safe
Notes
Cyber fraud
What makes a fraudster?
The strategy and tactics of a fraud - Authorized fraud
Unauthorized fraud
How criminals cash out: money mules
The impact of fraud
Fighting fraud: how to stay safe
Notes
Identity fraud
The impact of identity fraud on victims
The scale of identity theft and identity fraud
The tactics of identity fraudsters
Identity fraud and cyber crime - Avoiding identity theft
Notes
Social; media scams
Fake people
Fake goods
Fake influencer opportunities
Fake jobs
Fake news
t Surging social media scams
Stay social media savvy
Notes
Malicious insiders
What motivates malicious insiders?
Formula 1 spygate
A wake-up call
The impact of malicious insiders
Malicious insiders and the human side of cyber security
How businesses can protect against malicious insiders
Notes
Malware
Worms
Viruses
The global reach of malware
Trojans
Ransomware
Malware-as-a-service
Spyware
Protecting against malware
Notes
Randomware
Cryptocurrency
An evolving ransomware business model
Big game hunting in randsomware
Law enforcement whack-a-mole
Borders in a borderless crime
Insurance, brokers, and negotiators
To pay or not pay, is that the question?
Ransomware mitigations and managing an incident
Notes
Internet of Tings (IoT)
Default passwords
THe Mirai fallout
Lessons from Mirai
Mirai's legacy
Security the Internet of Things
Cyber security in an increasingly connected world
Notes
Cryptocurrency crime
Pig-butchering scams
Billions of cryptocurrecy
Cyrptocurrency: untraceable money?
Cryptocurrency investigations and the return on investtment
Not all exchanges are equal
Staying safe with cryptocurrency
Notes
Artificial intelligence
The rise of the machines
AI: a force multiplier of fear, uncertainty, and doubt
Gabage in, garbage, out
Large language models
Deepfakes
National and international implications of AI
Organizational implications of AI
Implications of AI for individuals
Plausible deniability
Staying cyber safe in an AI age
Notes
Conclusion: staying safe from cyber attacks.