Foreword |
|
xxiii | |
Introduction |
|
xxv | |
I Setting the Stage |
|
1 | (104) |
|
1 Overview of Cyber Risks |
|
|
3 | (8) |
|
Real Estate Wire Transfer Fraud Prevention Steps |
|
|
5 | (1) |
|
If You're a Victim of Wire Transfer Fraud |
|
|
6 | (1) |
|
|
6 | (2) |
|
Breaches, Cyberattacks, and Hacks-Oh My' |
|
|
8 | (1) |
|
|
9 | (2) |
|
|
11 | (12) |
|
|
13 | (1) |
|
|
14 | (2) |
|
|
16 | (1) |
|
|
17 | (1) |
|
Bad Actors Who Got Caught |
|
|
17 | (4) |
|
|
21 | (2) |
|
3 Attack Targets and Goals |
|
|
23 | (8) |
|
How Attackers Get Your Money |
|
|
24 | (1) |
|
What Attackers Do with Your Money |
|
|
24 | (1) |
|
How Attackers Get Your Credentials |
|
|
25 | (1) |
|
What Attackers Do with Your Credentials |
|
|
25 | (1) |
|
How Attackers Get Your PII |
|
|
26 | (1) |
|
What Attackers Do with Your PII |
|
|
26 | (1) |
|
How Attackers Get Your Computing Resources |
|
|
27 | (1) |
|
What Attackers Do with Your Computing Resources |
|
|
27 | (2) |
|
|
29 | (2) |
|
|
31 | (34) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (2) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
Cryptomining Malware and Cryptojacking |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
Government Agency Impersonation |
|
|
52 | (1) |
|
|
53 | (1) |
|
Virtual Kidnapping Extortion |
|
|
53 | (1) |
|
Unpaid Utility Bill Scams |
|
|
54 | (1) |
|
|
54 | (2) |
|
|
56 | (2) |
|
|
58 | (1) |
|
|
58 | (3) |
|
|
61 | (4) |
|
|
65 | (6) |
|
|
67 | (1) |
|
Links in the Attack Chain |
|
|
68 | (2) |
|
|
70 | (1) |
|
|
71 | (12) |
|
|
72 | (1) |
|
|
73 | (2) |
|
|
75 | (1) |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (2) |
|
|
81 | (2) |
|
7 Brilliance in the Basics |
|
|
83 | (8) |
|
Brilliance 1: Update Your Devices |
|
|
84 | (1) |
|
Brilliance 2: Enable Two-Factor Authentication |
|
|
85 | (1) |
|
Brilliance 3: Use a Password Manager |
|
|
86 | (1) |
|
Brilliance 4: Install and Update Antivirus Software |
|
|
87 | (2) |
|
Brilliance 5: Back Up Your Data |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (4) |
|
Being the Source of a Data Breach |
|
|
92 | (1) |
|
Mixing Work and Personal Information |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (10) |
|
Falling for a Phishing Attack |
|
|
96 | (2) |
|
Getting Infected with Malware |
|
|
98 | (2) |
|
Getting Infected with Ransomware |
|
|
100 | (2) |
|
|
102 | (3) |
II Specific Recommendations |
|
105 | (146) |
|
10 Protecting Your Identity |
|
|
107 | (18) |
|
Methods of Identity Theft |
|
|
108 | (2) |
|
How to Check Whether Your PII Is Exposed |
|
|
110 | (1) |
|
Identity Monitoring Services |
|
|
111 | (1) |
|
Recommendations: Protecting Your Credit Identity |
|
|
112 | (2) |
|
Other Types of Identity Theft |
|
|
114 | (1) |
|
|
114 | (3) |
|
Recommendations: Protecting Your Medical Identity |
|
|
117 | (1) |
|
Military Personnel Identity Theft |
|
|
118 | (1) |
|
Recommendations: Protecting Your Identity While in the Military |
|
|
118 | (1) |
|
Senior Citizen Identity Theft |
|
|
119 | (1) |
|
Recommendations: Protecting the Identities of Senior Citizens |
|
|
120 | (2) |
|
|
122 | (3) |
|
11 Protecting Your Children |
|
|
125 | (12) |
|
The Growing Problem of Child Identity Theft |
|
|
127 | (1) |
|
Recommendations: Protecting Your Child's Identity |
|
|
128 | (1) |
|
Protecting Your Child on the Computer |
|
|
129 | (2) |
|
|
131 | (2) |
|
Recommendations: Protecting Smart Toys |
|
|
133 | (2) |
|
Recommendations: Protecting Your Children Online |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (14) |
|
Home Buyer Wire Transfer Fraud |
|
|
138 | (1) |
|
Home Equity Wire Transfer Fraud |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
144 | (1) |
|
Scams Targeting the Unbanked and Underbanked |
|
|
145 | (1) |
|
Recommendations: Protecting Your Money |
|
|
146 | (3) |
|
|
149 | (2) |
|
|
151 | (8) |
|
|
152 | (1) |
|
The Value of a Hacked Email Account |
|
|
153 | (1) |
|
The Challenge of Email Privacy |
|
|
154 | (1) |
|
Recommendations: Protecting Your Email |
|
|
155 | (3) |
|
|
158 | (1) |
|
|
159 | (10) |
|
|
160 | (1) |
|
Threats to Your Files Not Caused by Bad Actors |
|
|
161 | (1) |
|
Threats to Your Files Caused by Bad Actors |
|
|
161 | (1) |
|
Cloud Storage vs. Local Storage |
|
|
161 | (1) |
|
Your Cloud File Storage Responsibilities |
|
|
162 | (1) |
|
Your Local File Storage Responsibilities |
|
|
162 | (1) |
|
Finding the Right Cloud Provider |
|
|
163 | (1) |
|
Cloud Storage Doesn't Equal File Backups |
|
|
163 | (1) |
|
Risks of Using Only an External Hard Drive |
|
|
164 | (1) |
|
Effective File Management |
|
|
164 | (1) |
|
Recommendations: Protecting Your Files |
|
|
165 | (3) |
|
|
168 | (1) |
|
15 Protecting Your Social Media |
|
|
169 | (10) |
|
Why Bad Actors Love Social Media |
|
|
171 | (1) |
|
Twitter: A Bad Actor's Paradise |
|
|
172 | (1) |
|
How Third Parties Mine Your Social Media Data |
|
|
173 | (3) |
|
Recommendations: Protecting Your Social Media |
|
|
176 | (2) |
|
|
178 | (1) |
|
16 Protecting Your Website Access and Passwords |
|
|
179 | (14) |
|
Password Hashing Slows Down Bad Actors |
|
|
180 | (1) |
|
Password Reuse Fuels Credential Stuffing |
|
|
181 | (1) |
|
The Great Password Problem |
|
|
182 | (2) |
|
Effective Password Management |
|
|
184 | (1) |
|
Password Creation Formula |
|
|
185 | (1) |
|
Password Creation Mistakes |
|
|
186 | (1) |
|
Recommendations: Protecting Your Website |
|
|
|
|
187 | (4) |
|
|
191 | (2) |
|
17 Protecting Your Computer |
|
|
193 | (10) |
|
The Rising Threat of Cryptojacking: The Illegal Form of Cryptomining |
|
|
195 | (1) |
|
Cryptomining Using Web Visitors' CPU Resources |
|
|
196 | (2) |
|
Donating CPU Resources for Good |
|
|
198 | (1) |
|
Recommendations: Protecting Your Computer |
|
|
198 | (3) |
|
|
201 | (2) |
|
18 Protecting Your Mobile Devices |
|
|
203 | (14) |
|
Protect Against Mobile Port-Out Scams |
|
|
206 | (2) |
|
|
208 | (1) |
|
iPhone vs. Android Security |
|
|
209 | (1) |
|
|
210 | (1) |
|
Recommendations: Protecting Your Mobile Devices |
|
|
211 | (4) |
|
|
215 | (2) |
|
19 Protecting Your Home Wi-Fi |
|
|
217 | (8) |
|
Threats Against Your Home Wi-Fi Network |
|
|
219 | (2) |
|
Recommendations: Protecting Your Home Wi-Fi |
|
|
221 | (3) |
|
|
224 | (1) |
|
20 Protecting Your IoT Devices |
|
|
225 | (12) |
|
Threats Against IoT Devices |
|
|
227 | (2) |
|
|
229 | (1) |
|
|
230 | (4) |
|
Recommendations: Protecting Your IoT Devices |
|
|
234 | (2) |
|
|
236 | (1) |
|
21 Protecting Your Information When Traveling |
|
|
237 | (14) |
|
|
239 | (2) |
|
|
241 | (2) |
|
Recommendations: Protecting Your Information |
|
|
|
|
243 | (2) |
|
Nation-State Travel Dangers |
|
|
245 | (1) |
|
Recommendations: Protecting Your Information |
|
|
|
|
246 | (3) |
|
|
249 | (2) |
Index |
|
251 | |