Book description
Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry.Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today.
This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers.
* Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts
* Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic
* Stay one step ahead of the enemy with all the latest information
Table of contents
- Cover (1/2)
- Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Foreword
- Chapter 1 Banking On Phishing (1/8)
- Chapter 1 Banking On Phishing (2/8)
- Chapter 1 Banking On Phishing (3/8)
- Chapter 1 Banking On Phishing (4/8)
- Chapter 1 Banking On Phishing (5/8)
- Chapter 1 Banking On Phishing (6/8)
- Chapter 1 Banking On Phishing (7/8)
- Chapter 1 Banking On Phishing (8/8)
- Chapter 2 Go Phish! (1/10)
- Chapter 2 Go Phish! (2/10)
- Chapter 2 Go Phish! (3/10)
- Chapter 2 Go Phish! (4/10)
- Chapter 2 Go Phish! (5/10)
- Chapter 2 Go Phish! (6/10)
- Chapter 2 Go Phish! (7/10)
- Chapter 2 Go Phish! (8/10)
- Chapter 2 Go Phish! (9/10)
- Chapter 2 Go Phish! (10/10)
- Chapter 3 E-Mail: The Weapon of Mass Delivery (1/11)
- Chapter 3 E-Mail: The Weapon of Mass Delivery (2/11)
- Chapter 3 E-Mail: The Weapon of Mass Delivery (3/11)
- Chapter 3 E-Mail: The Weapon of Mass Delivery (4/11)
- Chapter 3 E-Mail: The Weapon of Mass Delivery (5/11)
- Chapter 3 E-Mail: The Weapon of Mass Delivery (6/11)
- Chapter 3 E-Mail: The Weapon of Mass Delivery (7/11)
- Chapter 3 E-Mail: The Weapon of Mass Delivery (8/11)
- Chapter 3 E-Mail: The Weapon of Mass Delivery (9/11)
- Chapter 3 E-Mail: The Weapon of Mass Delivery (10/11)
- Chapter 3 E-Mail: The Weapon of Mass Delivery (11/11)
- Chapter 4 Crossing the Phishing Line (1/16)
- Chapter 4 Crossing the Phishing Line (2/16)
- Chapter 4 Crossing the Phishing Line (3/16)
- Chapter 4 Crossing the Phishing Line (4/16)
- Chapter 4 Crossing the Phishing Line (5/16)
- Chapter 4 Crossing the Phishing Line (6/16)
- Chapter 4 Crossing the Phishing Line (7/16)
- Chapter 4 Crossing the Phishing Line (8/16)
- Chapter 4 Crossing the Phishing Line (9/16)
- Chapter 4 Crossing the Phishing Line (10/16)
- Chapter 4 Crossing the Phishing Line (11/16)
- Chapter 4 Crossing the Phishing Line (12/16)
- Chapter 4 Crossing the Phishing Line (13/16)
- Chapter 4 Crossing the Phishing Line (14/16)
- Chapter 4 Crossing the Phishing Line (15/16)
- Chapter 4 Crossing the Phishing Line (16/16)
- Chapter 5 The Dark Side of the Web (1/19)
- Chapter 5 The Dark Side of the Web (2/19)
- Chapter 5 The Dark Side of the Web (3/19)
- Chapter 5 The Dark Side of the Web (4/19)
- Chapter 5 The Dark Side of the Web (5/19)
- Chapter 5 The Dark Side of the Web (6/19)
- Chapter 5 The Dark Side of the Web (7/19)
- Chapter 5 The Dark Side of the Web (8/19)
- Chapter 5 The Dark Side of the Web (9/19)
- Chapter 5 The Dark Side of the Web (10/19)
- Chapter 5 The Dark Side of the Web (11/19)
- Chapter 5 The Dark Side of the Web (12/19)
- Chapter 5 The Dark Side of the Web (13/19)
- Chapter 5 The Dark Side of the Web (14/19)
- Chapter 5 The Dark Side of the Web (15/19)
- Chapter 5 The Dark Side of the Web (16/19)
- Chapter 5 The Dark Side of the Web (17/19)
- Chapter 5 The Dark Side of the Web (18/19)
- Chapter 5 The Dark Side of the Web (19/19)
- Chapter 6 Malware, Money Movers, and Ma Bell Mayhem! (1/8)
- Chapter 6 Malware, Money Movers, and Ma Bell Mayhem! (2/8)
- Chapter 6 Malware, Money Movers, and Ma Bell Mayhem! (3/8)
- Chapter 6 Malware, Money Movers, and Ma Bell Mayhem! (4/8)
- Chapter 6 Malware, Money Movers, and Ma Bell Mayhem! (5/8)
- Chapter 6 Malware, Money Movers, and Ma Bell Mayhem! (6/8)
- Chapter 6 Malware, Money Movers, and Ma Bell Mayhem! (7/8)
- Chapter 6 Malware, Money Movers, and Ma Bell Mayhem! (8/8)
- Chapter 7 So Long, and Thanks for All the Phish! (1/7)
- Chapter 7 So Long, and Thanks for All the Phish! (2/7)
- Chapter 7 So Long, and Thanks for All the Phish! (3/7)
- Chapter 7 So Long, and Thanks for All the Phish! (4/7)
- Chapter 7 So Long, and Thanks for All the Phish! (5/7)
- Chapter 7 So Long, and Thanks for All the Phish! (6/7)
- Chapter 7 So Long, and Thanks for All the Phish! (7/7)
- Index (1/4)
- Index (2/4)
- Index (3/4)
- Index (4/4)
- Related Titles
Product information
- Title: Phishing Exposed
- Author(s):
- Release date: November 2005
- Publisher(s): Syngress
- ISBN: 9780080489537
You might also like
book
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by …
book
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the …
book
A Machine-Learning Approach to Phishing Detection and Defense
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information …
book
Cybersecurity in the COVID-19 Pandemic
This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat …