Cuckoo Malware Analysis

Rating: 
Amazon Price: N/A (as of July 27, 2017 03:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In Detail

Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.
Continue reading “Cuckoo Malware Analysis”

@War: The Rise of the Military-Internet Complex

Rating: 
Amazon Price: N/A (as of July 27, 2017 14:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"Chilling . . . Extraordinary and urgent." — Washington Post

“Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors.” — Los Angeles Times
Continue reading “@War: The Rise of the Military-Internet Complex”

Cybersecurity for Everyone: Securing your home or small business network

Rating: 
Amazon Price: $13.99 $13.99 (as of July 27, 2017 04:29 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make using the Internet more safe and secure and protect the family as well as the business. -Identity Theft. According to the Symantec Internet Security Report (2014), mega breaches are data breaches that result in at least 10 million identities exposed in an individual incident. There were eight mega breaches in 2013, compared with only one in 2012. – Viruses and Malware. Some security experts estimate there are more than 250,000 new malware variants detected daily and more than 30,000 websites exploited daily. These numbers are staggering. – Email Security. Learn how to reduce the amount of SPAM that makes it to your inbox. Improve your email security habits and discover better ways to communicate safely and with privacy. – Internet and Browsing Security. You cannot afford to leave the security of your sensitive information up to your ISP. It is actually easy to apply a layered approach to security and minimize your risk. Learn about your options; then pick and choose what works for you and your situation.

BIT WARS: Hacking Report: Top Hacks and Attacks of 2014 (Volume 1)

Rating: 
Amazon Price: $3.99 $3.99 (as of July 26, 2017 17:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In BIT WARS: Hacking Report: Top Hacks and Attacks of 2014, Thomas Hyslip presents the who, what, when, where, why, and how, of the top hacks of 2014. 2014 was a year to be remembered in hacking. Sony was attacked by North Korea, Six Chinese military officers were indicted for hacking US companies, and the Point of Sale Malware attacks continued to compromise million of credit and debit cards. With no end in sight, BIT WARS provides a concise overview of the years top hacks and attacks.

Financial Crime and Gambling in a Virtual World: A New Frontier in Cybercrime

Amazon Price: $110.00 $77.68 You save: $32.32 (29%). (as of July 26, 2017 17:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

'Virtual currencies, particularly crypt-currencies, have been identified as potential money laundering and terrorism financing instruments due to their ability to transfer money anonymously and instantaneously over the globe. Governments and regulators have also recognized the need to more closely monitor and track virtual currency purchases and accounts to avoid the industry being exploited for money laundering or terrorism financing purposes, as explained in this book. The broad overview of various international legal approaches attempting to address this issue would be a great resource for legal and anti-money laundering or counter terrorism financing graduate students, scholars and practitioners interested in virtual currencies research.'
– Raymond Choo, University of South Australia

'This book is a comprehensive, highly detailed review of cybercrime and the issues raised by gambling in virtual environments. It makes an excellent contribution to the evolving discussion about the risks and controls relating to these activities. I would highly recommend it to anyone interested in financial crime and virtual environments from an international perspective.'
– Liz Falconer, University of the West of England, UK
Continue reading “Financial Crime and Gambling in a Virtual World: A New Frontier in Cybercrime”