Phishing Dark Waters

The Offensive and Defensive Sides of Malicious Emails

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Phishing Dark Waters by Christopher Hadnagy, Michele Fincher, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Christopher Hadnagy, Michele Fincher ISBN: 9781118958483
Publisher: Wiley Publication: March 18, 2015
Imprint: Wiley Language: English
Author: Christopher Hadnagy, Michele Fincher
ISBN: 9781118958483
Publisher: Wiley
Publication: March 18, 2015
Imprint: Wiley
Language: English

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program.

Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay.

  • Learn what a phish is, and the deceptive ways they've been used
  • Understand decision-making, and the sneaky ways phishers reel you in
  • Recognize different types of phish, and know what to do when you catch one
  • Use phishing as part of your security awareness program for heightened protection

Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program.

Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay.

Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.

More books from Wiley

Cover of the book Contributions to Modern and Ancient Tidal Sedimentology by Christopher Hadnagy, Michele Fincher
Cover of the book Variance-Constrained Multi-Objective Stochastic Control and Filtering by Christopher Hadnagy, Michele Fincher
Cover of the book Radio Receiver Technology by Christopher Hadnagy, Michele Fincher
Cover of the book Guitar For Dummies by Christopher Hadnagy, Michele Fincher
Cover of the book Professional Rope Access by Christopher Hadnagy, Michele Fincher
Cover of the book The Procurement and Supply Manager's Desk Reference by Christopher Hadnagy, Michele Fincher
Cover of the book Dating - Philosophy for Everyone by Christopher Hadnagy, Michele Fincher
Cover of the book Shadows of Empire by Christopher Hadnagy, Michele Fincher
Cover of the book Vacuum Technology in the Chemical Industry by Christopher Hadnagy, Michele Fincher
Cover of the book 21 Dirty Tricks at Work by Christopher Hadnagy, Michele Fincher
Cover of the book Women's Health Psychology by Christopher Hadnagy, Michele Fincher
Cover of the book 101 Ways to Save Money on Your Tax - Legally! 2017-2018 by Christopher Hadnagy, Michele Fincher
Cover of the book Student Affairs Professionals Cultivating Campus Climates Inclusive of International Students by Christopher Hadnagy, Michele Fincher
Cover of the book Essentials of Disease in Wild Animals by Christopher Hadnagy, Michele Fincher
Cover of the book The Hard Times Guide to Retirement Security by Christopher Hadnagy, Michele Fincher
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy