At our company, we research cyber hacking attacks all over the world to see if our server protection product will protect against the techniques used in the attack. In the course of this research, one important conclusion kept leaping out: MOST HACKING ATTEMPTS ARE PREVENTABLE FOR LITTLE COST AND SOME KNOWLEDGE. Cyber security can be very mysterious. The constant news about hacking can be very frightening. Either can leave you wondering if you will be the next victim. This book is for the majority of people who aren't involved in cyber security for a living. It’s for those who do other things. It’s an attempt to make cyber security simple, to acquaint you with the basics, and to provide you with easy things you can do to protect your family and your business from those who would use a computer to do you harm. Though terms will be introduced, no specialized knowledge in systems and network administration or IT security is presumed. You might be a homeowner wanting to protect your family. You might be a small business wanting to know what you can do that is low cost, yet effective. You might be a CEO/CFO/COO/Board Member of a large enterprise wanting to communicate with your IT department more effectively about this most important subject. CIO/CISO's may also find this book helpful in educating corporate members on cyber security.
Harden the human firewall against the most current threats
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.
Continue reading “Social Engineering: The Science of Human Hacking”
In keeping with the fast-changing nature of this field, this third edition has been completely revised and updated. The book includes additional weblinks and all existing weblinks have been verified for accuracy. Three chapters have been renamed to be more reflective of current trends, and several chapters are now consolidated into a single chapter, as the book embraces a new "all-hazards approach" to homeland security, critical infrastructure protection and assurance, and emergency management.
A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.
Continue reading “We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency”