Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
3.5/5
()
Currently unavailable
Currently unavailable
About this ebook
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program.
Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay.
- Learn what a phish is, and the deceptive ways they've been used
- Understand decision-making, and the sneaky ways phishers reel you in
- Recognize different types of phish, and know what to do when you catch one
- Use phishing as part of your security awareness program for heightened protection
Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.
Christopher Hadnagy
Christopher Hadnagy is a global security expert and master hacker. He is the founder and CEO of Social-Engineer, LLC, the creator of the popular Social Engineer Podcast, website, and newsletter, and designed “Advanced Practical Social Engineering,” the first hands-on social engineering training course and certification for law enforcement, military, and private sector professionals. He is also the first (adjunct) professor of social engineering for the University of Arizona, one of the NSA-designated Centers of Academic Excellence in Cyber Operations. Hadnagy is the creator of the Human Hacking Conference, an annual conference focused on training people who to hack themselves to achieve their goals. A highly sought-after writer and speaker, he has spoken at events such as RSA and Black Hat and given numerous presentations for corporate, government, and military clients. He is the bestselling author of four technical books for security professionals: Social Engineering: The Art of Human Hacking; Unmasking the Social Engineer: The Human Element of Security; Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails; and Social Engineering: The Science of Human Hacking, which is now in its second edition. He is also the founder, executive director, and board member of the Innocent Lives Foundation, a nonprofit that fights the sexual abuse of children.
Related to Phishing Dark Waters
Related ebooks
Hacking For Dummies Rating: 4 out of 5 stars4/5We Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5Rootkits For Dummies Rating: 0 out of 5 stars0 ratingsMalware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsSSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285 Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CISSP CBK Reference Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-003 Rating: 1 out of 5 stars1/5Computer Forensics For Dummies Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-001 Rating: 0 out of 5 stars0 ratingsIT Disaster Recovery Planning For Dummies Rating: 2 out of 5 stars2/5CEH v9: Certified Ethical Hacker Version 9 Study Guide Rating: 0 out of 5 stars0 ratingsCISSP Official (ISC)2 Practice Tests Rating: 5 out of 5 stars5/5Data Breach Preparation and Response: Breaches are Certain, Impact is Not Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Tests: Exam SY0-501 Rating: 0 out of 5 stars0 ratingsSarbanes-Oxley For Dummies Rating: 4 out of 5 stars4/5VoIP For Dummies Rating: 0 out of 5 stars0 ratingsComputer Viruses For Dummies Rating: 0 out of 5 stars0 ratingsRFID For Dummies Rating: 4 out of 5 stars4/5CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide Rating: 0 out of 5 stars0 ratingsCCSP Official (ISC)2 Practice Tests Rating: 3 out of 5 stars3/5Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis Rating: 0 out of 5 stars0 ratingsNo Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Rating: 4 out of 5 stars4/5CompTIA CySA+ Study Guide: Exam CS0-001 Rating: 0 out of 5 stars0 ratingsSeven Deadliest Unified Communications Attacks Rating: 0 out of 5 stars0 ratingsTribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership Rating: 0 out of 5 stars0 ratingsHome Networking Do-It-Yourself For Dummies Rating: 4 out of 5 stars4/5Wireless Networks For Dummies Rating: 2 out of 5 stars2/5Network Attacks and Exploitation: A Framework Rating: 4 out of 5 stars4/5
Security For You
How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsNetwork+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Rating: 3 out of 5 stars3/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratings
Reviews for Phishing Dark Waters
1 rating0 reviews