
- 304 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats. Hacked offers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target.Featuring expert commentary from world-leading cybersecurity experts and ethical hackers, this book uncovers the fascinating stories of the most insidious and notorious cyber attacks, including how the Mirai malware almost took down the internet and how a supply chain attack infiltrated the US government and other global institutions.From social engineering and data theft to ransomware and Distributed Denial-of-Service (DDoS) attacks, there are numerous strategies that hackers use to target our finances and data. Uncover their secrets and learn how to safeguard your data with Hacked.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- About the author
- Preface
- Acknowledgements
- Introduction: the groups behind cyber attacks
- 01 Phishing
- 02 Account compromise
- 03 Vulnerabilities and exploits
- 04 Romance fraud
- 05 Cyber fraud
- 06 Identity fraud
- 07 Social media scams
- 08 Malicious insiders
- 09 Malware
- 10 Ransomware
- 11 Internet of Things (IoT)
- 12 Cryptocurrency crime
- 13 Artificial intelligence
- 14 Conclusion: staying safe from cyber attacks
- Index