
- 504 pages
- English
- PDF
- Available on iOS & Android
About this book
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. This volume explores the state of threats present in the cyber fraud underground. It discusses phishing/pharming, trojans/toolkits, direct threats, and pump-and-dump scams. By examining the operations of the cyber criminal, the book provides perspective into the general incentives, risks, and behavioral patterns of the fraudsters. Armed with this information, organizations and individuals are better able to develop countermeasures and crafting tactics to disrupt the fraud underground and secure their systems.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Front cover
- Contents
- Introduction
- PART I: UNDERGROUND CULTURE
- Chapter 1. Emerging Economic Models for Software Vulnerability Research
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques
- Chapter 3. The Cyber Threat Landscape in Russia
- Chapter 4. The Cyber Threat Landscape in Brazil
- Chapter 5. The Russian Business Network: The Rise and Fall of a Criminal ISP
- Chapter 6. Banking Trojans: An Overview
- Chapter 7. Inside the World of Money Mules
- PART II: UNDERGROUND INNOVATION
- Chapter 8. IFrame Attacks - An Examination of the Business of IFrame Exploitation
- Chapter 9. Distributed Denial of Service (DDoS) Attacks: Motivations and Methods
- Chapter 10. The Torpig Trojan Exposed
- Chapter 11. The Lagma Trojan*
- Chapter 12. Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks
- Chapter 13. SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse
- Chapter 14. Preventing Malicious Code from "Phoning Home"
- Chapter 15. Mobile Malicious Code Trends
- Epilogue
- Index
- Back cover