Outfox'em : Protecting Yourself and Your Family from Cyber Threats.

The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use t...

Full description

Saved in:
Bibliographic Details
Main Author: McDonough, Bart R.
Format: eBook
Language:English
Published: Newark : John Wiley & Sons, Incorporated, 2018.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000Mi 4500
001 on1079007841
003 OCoLC
005 20240809213013.0
006 m o d
007 cr |n|---|||||
008 181215s2018 nju o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d SGP  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9781119559634 
020 |a 1119559634 
035 |a (OCoLC)1079007841 
050 4 |a TK5105.59  |b .M336 2019 
049 |a HCDD 
100 1 |a McDonough, Bart R. 
245 1 0 |a Outfox'em :  |b Protecting Yourself and Your Family from Cyber Threats. 
260 |a Newark :  |b John Wiley & Sons, Incorporated,  |c 2018. 
300 |a 1 online resource (304 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright; About the Author; Credits; Acknowledgments; Contents; Foreword; Introduction; Debunking Cybersecurity Myths; Hacking Myths; File Storage and the Cloud Myths; Password Management Myths; Web Browsing Myths; Email Account Myths; Identity Theft Myths; How to Use This Book to Outsmart Bad Actors; Part I: Setting the Stage; Part II: Specific Recommendations; How to Contact the Author; Download; I Setting the Stage; 1 Overview of Cyber Risks; Real Estate Wire Transfer Fraud Prevention Steps; If You're a Victim of Wire Transfer Fraud; Cyber-Risk Statistics 
505 8 |a Breaches, Cyberattacks, and Hacks-Oh My!Notes; 2 Attackers; The Adversary; Nation-State Attackers; Criminal Organizations; Terrorist Organizations; Bad Actors Who Got Caught; Notes; 3 Attack Targets and Goals; How Attackers Get Your Money; What Attackers Do with Your Money; How Attackers Get Your Credentials; What Attackers Do with Your Credentials; How Attackers Get Your PII; What Attackers Do with Your PII; How Attackers Get Your Computing Resources; What Attackers Do with Your Computing Resources; Notes; 4 Attack Methods; Social Engineering; Phishing; Phishing Attacks; Email Phishing 
505 8 |a Spear PhishingWhaling; Email Compromise; Clone Phishing; Voice Phishing; SMS Phishing; Pretexting; Malware; Cryptomining Malware and Cryptojacking; Cryptomining; Cryptojacking; Ransomware; Spyware; Scareware; Adware; Trojans; Wi-Fi Network Hacking; Scams; Fake Technical Support; Government Agency Impersonation; The Grandparent Scam; Virtual Kidnapping Extortion; Unpaid Utility Bill Scams; Online Dating Scams; Job Scams; Charity Scams; Robocalling Scams; Notes; 5 Attack Chain; Attack Chain Phases; Links in the Attack Chain; Notes; 6 Attack Vectors; Email; Texting; Phone Calls; Websites 
505 8 |a SoftwareUSB Key; Wi-Fi; Notes; 7 Brilliance in the Basics; Brilliance 1: Update Your Devices; Brilliance 2: Enable Two-Factor Authentication; Brilliance 3: Use a Password Manager; Brilliance 4: Install and Update Antivirus Software; Brilliance 5: Back Up Your Data; Notes; 8 Mistakes; Being the Source of a Data Breach; Mixing Work and Personal Information; Notes; 9 Incident Response; Falling for a Phishing Attack; Getting Infected with Malware; Getting Infected with Ransomware; Email Compromise; II Specific Recommendations; 10 Protecting Your Identity; Methods of Identity Theft 
505 8 |a How to Check Whether Your PII Is ExposedIdentity Monitoring Services; Recommendations: Protecting Your Credit Identity; Other Types of Identity Theft; Medical Identity Theft; Recommendations: Protecting Your Medical Identity; Military Personnel Identity Theft; Recommendations: Protecting Your Identity While in the Military; Senior Citizen Identity Theft; Recommendations: Protecting the Identities of Senior Citizens; Notes; 11 Protecting Your Children; The Growing Problem of Child Identity Theft; Recommendations: Protecting Your Child's Identity; Protecting Your Child on the Computer 
500 |a Smart Toy Risks 
520 |a The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret. In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn."  |c --Publisher's description. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
758 |i has work:  |a Outfox'em (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCXGpQFVgVjCkjGt3GpQRfC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a McDonough, Bart R.  |t Outfox'em : Protecting Yourself and Your Family from Cyber Threats.  |d Newark : John Wiley & Sons, Incorporated, ©2018  |z 9781119559610 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=5612908  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD