Outfox'em : Protecting Yourself and Your Family from Cyber Threats.

The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use t...

Full description

Saved in:
Bibliographic Details
Main Author: McDonough, Bart R.
Format: eBook
Language:English
Published: Newark : John Wiley & Sons, Incorporated, 2018.
Subjects:
Online Access:Click for online access
Table of Contents:
  • Cover; Title Page; Copyright; About the Author; Credits; Acknowledgments; Contents; Foreword; Introduction; Debunking Cybersecurity Myths; Hacking Myths; File Storage and the Cloud Myths; Password Management Myths; Web Browsing Myths; Email Account Myths; Identity Theft Myths; How to Use This Book to Outsmart Bad Actors; Part I: Setting the Stage; Part II: Specific Recommendations; How to Contact the Author; Download; I Setting the Stage; 1 Overview of Cyber Risks; Real Estate Wire Transfer Fraud Prevention Steps; If You're a Victim of Wire Transfer Fraud; Cyber-Risk Statistics
  • Breaches, Cyberattacks, and Hacks-Oh My!Notes; 2 Attackers; The Adversary; Nation-State Attackers; Criminal Organizations; Terrorist Organizations; Bad Actors Who Got Caught; Notes; 3 Attack Targets and Goals; How Attackers Get Your Money; What Attackers Do with Your Money; How Attackers Get Your Credentials; What Attackers Do with Your Credentials; How Attackers Get Your PII; What Attackers Do with Your PII; How Attackers Get Your Computing Resources; What Attackers Do with Your Computing Resources; Notes; 4 Attack Methods; Social Engineering; Phishing; Phishing Attacks; Email Phishing
  • Spear PhishingWhaling; Email Compromise; Clone Phishing; Voice Phishing; SMS Phishing; Pretexting; Malware; Cryptomining Malware and Cryptojacking; Cryptomining; Cryptojacking; Ransomware; Spyware; Scareware; Adware; Trojans; Wi-Fi Network Hacking; Scams; Fake Technical Support; Government Agency Impersonation; The Grandparent Scam; Virtual Kidnapping Extortion; Unpaid Utility Bill Scams; Online Dating Scams; Job Scams; Charity Scams; Robocalling Scams; Notes; 5 Attack Chain; Attack Chain Phases; Links in the Attack Chain; Notes; 6 Attack Vectors; Email; Texting; Phone Calls; Websites
  • SoftwareUSB Key; Wi-Fi; Notes; 7 Brilliance in the Basics; Brilliance 1: Update Your Devices; Brilliance 2: Enable Two-Factor Authentication; Brilliance 3: Use a Password Manager; Brilliance 4: Install and Update Antivirus Software; Brilliance 5: Back Up Your Data; Notes; 8 Mistakes; Being the Source of a Data Breach; Mixing Work and Personal Information; Notes; 9 Incident Response; Falling for a Phishing Attack; Getting Infected with Malware; Getting Infected with Ransomware; Email Compromise; II Specific Recommendations; 10 Protecting Your Identity; Methods of Identity Theft
  • How to Check Whether Your PII Is ExposedIdentity Monitoring Services; Recommendations: Protecting Your Credit Identity; Other Types of Identity Theft; Medical Identity Theft; Recommendations: Protecting Your Medical Identity; Military Personnel Identity Theft; Recommendations: Protecting Your Identity While in the Military; Senior Citizen Identity Theft; Recommendations: Protecting the Identities of Senior Citizens; Notes; 11 Protecting Your Children; The Growing Problem of Child Identity Theft; Recommendations: Protecting Your Child's Identity; Protecting Your Child on the Computer