Phishing Dark Waters Phishing Dark Waters

Phishing Dark Waters

The Offensive and Defensive Sides of Malicious Emails

    • $21.99
    • $21.99

Publisher Description

An essential anti-phishing desk reference for anyone with an email address
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program.

Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay.
Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection
Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.

GENRE
Computers & Internet
RELEASED
2015
March 18
LANGUAGE
EN
English
LENGTH
224
Pages
PUBLISHER
Wiley
SELLER
John Wiley & Sons, Inc.
SIZE
12.6
MB

More Books Like This

The Smartest Person in the Room The Smartest Person in the Room
2021
The Cyber Attack Survival Manual The Cyber Attack Survival Manual
2017
Debugging Teams Debugging Teams
2015
Shipping Greatness Shipping Greatness
2012
Reverse Deception: Organized Cyber Threat Counter-Exploitation Reverse Deception: Organized Cyber Threat Counter-Exploitation
2012
Cyber-Security in Healthcare Cyber-Security in Healthcare
2015

More Books by Christopher Hadnagy, Michele Fincher & Robin Dreeke

Human Hacking Human Hacking
2021
Social Engineering Social Engineering
2018
Unmasking the Social Engineer Unmasking the Social Engineer
2014
Human Hacking Human Hacking
2019
Ingeniería social. La ciencia de la piratería humana Ingeniería social. La ciencia de la piratería humana
2023
Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II
2020