Short Message Service (SMS) is widely used to provide communication between users around the world. In the last years, it has become a lucrative way for cybercriminals to infect mobile devices with botnets and launch malicious attacks without the user's knowledge such as: SMS spam and SMS premium rate fraud. SMS spam is one of the dangerous malicious activities as the user is charged for each sent SMS spam. Existing solutions to this issue are no longer adequate as they are either costly in terms of resources, inefficient, or require user intervention with some knowledge on security. In this book, we design, analyze, and implement a system that detects any attempt to send out malicious SMS spams from the mobile device. The proposed system combines the rule-based and the content-based approaches into one detection process. It achieves good performance in terms of detection time and execution cost, and offers a good tradeoff between resilience against attacks and user interaction with the system. This book is intended for multiple audiences: academic, professional, students, and anyone else who is interested in IT security, and particularly in mobile security and botnet detection.
Finance: Cloud Computing, Cyber Security and Cyber Heist – Beginners Guide to Help Protect Against Online Theft in the Cyber World
***Please Note: This is a Guide to Help Protect against Online Theft in the Cyber World – For Beginners***
Continue reading “Finance: Cloud Computing, Cyber Security and Cyber Heist – Beginners Guide to Help Protect Against Online Theft in the Cyber World”
An airliner’s controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction.
At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn’t much time if he hopes to prevent an international catastrophe.
Continue reading “Zero Day: A Novel”
Learn the Real Mechanics behind Search Engine Optimization
So much has changed for Google SEO and the industry as a whole. If you're just coming into the Search Engine Optimization field it's important to note that if you're looking for a guide to learn the real methods & techniques for ranking today, it had better be a recent guide.
Continue reading “SEO Black Book: A Guide to the Search Engine Optimization Industry's Secrets: The SEO Series, Volume 1”
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award
"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog
Continue reading “SQL Injection Attacks and Defense”