O'Reilly logo

Dissecting the Hack by Jayson E Street

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

3

Security Threats Are Real (STAR)

Abstract

Security Threats Are Real (STAR) documents the reality of the tactics and techniques introduced in the story. Each major technology and topic is called out within the STAR section to detail real life examples of the technology in use. There is no magic featured within the story; all attacks and defenses are based upon realistic implementations.

Keywords

RFID; Bitcoin; Dogecoin; Mt Gox; cryptocurrency; Steganography; SSL; APT; APT1; Espionage; Malware; Trojans; RAT; Adware; Crimeware; Ransomware; reverse engineering; Digital Forensics; Incident Response; Penetration Testing; SCADA; Mobile Phone; SMS; Government surveillance; 3D Printing; Maltego; OSINT; Encryption; Wickr; Firewalls; Hacker Space; Wikileaks; ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required