Books+ Search Results

Hacked : the secrets behind cyber attacks

Title
Hacked : the secrets behind cyber attacks / Jessica Barker.
ISBN
9781398613720
139861372X
9781398613706
1398613703
9781398613713
1398613711
Publication
London, United Kingdom ; New York, NY : Kogan Page Limited, 2024.
Copyright Notice Date
©2024.
Physical Description
xiv, 284 pages ; 20 cm.
Summary
When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats. Hacked offers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target. Featuring expert commentary from world-leading cybersecurity experts and ethical hackers, this book uncovers the fascinating stories of the most insidious and notorious cyber attacks, including how the Mirai malware almost took down the internet and how a supply chain attack infiltrated the US government and other global institutions. From social engineering and data theft to ransomware and Distributed Denial-of-Service (DDoS) attacks, there are numerous strategies that hackers use to target our finances and data. Uncover their secrets and learn how to safeguard your data with Hacked. -- amazon.com.
Format
Books
Language
English
Added to Catalog
May 20, 2024
Bibliography
Includes bibliographical references and index.
Contents
Introduction: the groups behind cyber attacks
Phishing
Email phishing
Business email compromise
Phishing phnone calls
Caller ID spoofing
Phishing messages
QR code phishing
Hybrid phishing
Protect against phishing
Notes
Account compromise
Passwords
SMS 2FA
Stronger 2FA
2FA fatigue
Password managers
Advice for securing your accounts
Notes
Vulnerabilities and exploits
Zero-day vulnerabilities
N-day vulnerabilities - A vacuum of patches
The vulnerability ecosystem
Vulnerabilities and different devices
Managing vulnerabilities and mitigating exploits
Romance fraud
The psychological strategy of romance scammers
When you are the catfish
Social media and romance scams
The psychology of romance fraud
The impact of romance fraud on victims
Sextortion: image-based sexual abuse
Spotting romance fraud red flags and staying safe
Notes
Cyber fraud
What makes a fraudster?
The strategy and tactics of a fraud - Authorized fraud
Unauthorized fraud
How criminals cash out: money mules
The impact of fraud
Fighting fraud: how to stay safe
Notes
Identity fraud
The impact of identity fraud on victims
The scale of identity theft and identity fraud
The tactics of identity fraudsters
Identity fraud and cyber crime - Avoiding identity theft
Notes
Social; media scams
Fake people
Fake goods
Fake influencer opportunities
Fake jobs
Fake news
t Surging social media scams
Stay social media savvy
Notes
Malicious insiders
What motivates malicious insiders?
Formula 1 spygate
A wake-up call
The impact of malicious insiders
Malicious insiders and the human side of cyber security
How businesses can protect against malicious insiders
Notes
Malware
Worms
Viruses
The global reach of malware
Trojans
Ransomware
Malware-as-a-service
Spyware
Protecting against malware
Notes
Randomware
Cryptocurrency
An evolving ransomware business model
Big game hunting in randsomware
Law enforcement whack-a-mole
Borders in a borderless crime
Insurance, brokers, and negotiators
To pay or not pay, is that the question?
Ransomware mitigations and managing an incident
Notes
Internet of Tings (IoT)
Default passwords
THe Mirai fallout
Lessons from Mirai
Mirai's legacy
Security the Internet of Things
Cyber security in an increasingly connected world
Notes
Cryptocurrency crime
Pig-butchering scams
Billions of cryptocurrecy
Cyrptocurrency: untraceable money?
Cryptocurrency investigations and the return on investtment
Not all exchanges are equal
Staying safe with cryptocurrency
Notes
Artificial intelligence
The rise of the machines
AI: a force multiplier of fear, uncertainty, and doubt
Gabage in, garbage, out
Large language models
Deepfakes
National and international implications of AI
Organizational implications of AI
Implications of AI for individuals
Plausible deniability
Staying cyber safe in an AI age
Notes
Conclusion: staying safe from cyber attacks.
Citation

Available from:

Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?