3

Security Threats Are Real (STAR)

Abstract

Security Threats Are Real (STAR) documents the reality of the tactics and techniques introduced in the story. Each major technology and topic is called out within the STAR section to detail real life examples of the technology in use. There is no magic featured within the story; all attacks and defenses are based upon realistic implementations.

Keywords

RFID; Bitcoin; Dogecoin; Mt Gox; cryptocurrency; Steganography; SSL; APT; APT1; Espionage; Malware; Trojans; RAT; Adware; Crimeware; Ransomware; reverse engineering; Digital Forensics; Incident Response; Penetration Testing; SCADA; Mobile Phone; SMS; Government surveillance; 3D Printing; Maltego; OSINT; Encryption; Wickr; Firewalls; Hacker Space; Wikileaks; ...

Get Dissecting the Hack now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.