July 2015
Intermediate to advanced
234 pages
7h 48m
English
Security Threats Are Real (STAR) documents the reality of the tactics and techniques introduced in the story. Each major technology and topic is called out within the STAR section to detail real life examples of the technology in use. There is no magic featured within the story; all attacks and defenses are based upon realistic implementations.
RFID; Bitcoin; Dogecoin; Mt Gox; cryptocurrency; Steganography; SSL; APT; APT1; Espionage; Malware; Trojans; RAT; Adware; Crimeware; Ransomware; reverse engineering; Digital Forensics; Incident Response; Penetration Testing; SCADA; Mobile Phone; SMS; Government surveillance; 3D Printing; Maltego; OSINT; Encryption; Wickr; Firewalls; Hacker Space; Wikileaks; ...