Murakami Sale
 
 

Recently Viewed clear list


Original Essays | August 21, 2014

Richard Bausch: IMG Why Literature Can Save Us



Our title is, of course, a problem. "Why Literature Can Save Us." And of course the problem is one of definition: what those words mean. What is... Continue »
  1. $18.87 Sale Hardcover add to wish list

    Before, During, After

    Richard Bausch 9780307266262

spacer
Qualifying orders ship free.
$64.95
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Computers Reference- General

Phishing Exposed

by

Phishing Exposed Cover

 

Synopses & Reviews

Publisher Comments:

If you have ever received a phish, become a victim of a phish, or manage the security of a major e-commerce or financial site, then you need to read this book. The author of this book delivers the unconcealed techniques of phishers including their evolving patterns, and how to gain the upper hand against the ever-accelerating attacks they deploy. Filled with elaborate and unprecedented forensics, Phishing Exposed details techniques that system administrators, law enforcement, and fraud investigators can exercise and learn more about their attacker and their specific attack methods, enabling risk mitigation in many cases before the attack occurs.

Phishers have 4 basic attack methods, and are ever expanding their arsenal of techniques. But underneath, you'll find they still contain fundamental flaws within their attack-- if you look close enough. The author reveals these techniques and dives deep into exploiting the phishers, empowering the defending side to track, detect, prevent and deter future attacks. The first set of chapters introduces you to the art of research and demonstrates the detailed and accurate results that this enduring practice presents. This analysis establishes the existence of multiple distinct phishing groups, and the author delivers a powerful technique to identify groups of phishers, even linking them to certain spamming groups. Presently, there are 36 unique active groups, with 4 main large groups that are encompassing the principal activity and possess the majority of earnings acquired from these illicit endeavors.

After uncovering the properties of phishing: the first phases of attack, the author takes you into the exploration of the moneytransfer scams and the business fronts they create to recruit mules to do their laundry. An exploration of the how-to uncovers the rules mule drivers must employ on mule recruitment and how these rules bind them in their attempts to protect their identity. Also observed is how telephony exploitation is used to remain anonymous and scam transfer companies, such as moneygram and western union, and how evolving future telecommunication attacks may enable phishers to continue their illicit endeavors.

Phishing Exposed links the malware authors to the phishing community, and how the economics of the underground are established, including demonstration of the malware used, with analysis of some undetectable malware including variants of Berbew, mitgleider, A311 Death (haxdoor) and Sasser. The final chapters explore the other activities of this organized criminal enterprise, and discusses the impact of limited legislation and collaboration by domestic and international law enforcement that hinders successful apprehension. The author encourages collaboration, and displays the successes with intelligence and reconnaissance due to collaboration with ISP's, other investigators, law enforcement and financial institutions.

Book News Annotation:

Phishing is a form of fraud perpetrated on the Internet. In its most common form it involves stealing private information from individuals--SSN, bank account numbers, credit card numbers, passwords--and using this information to raid bank accounts and purchase goods. These activities are carried out by international phishing gangs which according to the author "are successfully stealing between 100,000 to 300,000 dollars per month". He then goes on to describe in detail the three classes of phishing: impersonation (e.g. a web site which looks exactly like one's bank, but isn't), forwarding (posing as a trusted source, e.g. eBay, and asking for an email reply containing private information), and popups (windows which popup adjacent to legitimate web sites). There follows detailed technical descriptions of how the Internet is "crawled" for valid email addresses and how phishers hijack browsers, steal cookies, and insert malicious browser code. These activities clearly represent a threat to the future of e-commerce, and the author offers many suggestions which can help hold this activity in check--now and in the future,
Annotation 2006 Book News, Inc., Portland, OR (booknews.com)

Book News Annotation:

Phishing is a form of fraud perpetrated on the Internet. In its most common form it involves stealing private information from individuals--SSN, bank account numbers, credit card numbers, passwords--and using this information to raid bank accounts and purchase goods. These activities are carried out by international phishing gangs which according to the author "are successfully stealing between 100,000 to 300,000 dollars per month". He then goes on to describe in detail the three classes of phishing: impersonation (e.g. a web site which looks exactly like one's bank, but isn't), forwarding (posing as a trusted source, e.g. eBay, and asking for an email reply containing private information), and popups (windows which popup adjacent to legitimate web sites). There follows detailed technical descriptions of how the Internet is "crawled" for valid email addresses and how phishers hijack browsers, steal cookies, and insert malicious browser code. These activities clearly represent a threat to the future of e-commerce, and the author offers many suggestions which can help hold this activity in check--now and in the future, Annotation ©2006 Book News, Inc., Portland, OR (booknews.com)

Synopsis:

Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry.

Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today.

This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers.

* Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts

* Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic

* Stay one step ahead of the enemy with all the latest information

Synopsis:

Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry.

Table of Contents

1 The art of Research

2 Email Effectiveness

3 Where's The Money

4 Lawful Forensics

5 Malware and XSS 5

6 Telephony Exploitation

7.0 Final Analysis

Product Details

ISBN:
9781597490306
Foreword:
Stewart, Joe
Publisher:
Syngress Publishing
Foreword by:
Stewart, Joe
Foreword:
Stewart, Joe
Author:
James, Lance
Subject:
General
Subject:
Prevention
Subject:
Computer security
Subject:
Security
Subject:
Computer Science
Subject:
Identity theft - Prevention
Subject:
Computers-Reference - General
Publication Date:
20051031
Binding:
TRADE PAPER
Language:
English
Illustrations:
Y
Pages:
450
Dimensions:
9 x 7 in

Related Subjects

Computers and Internet » Computers Reference » General
Computers and Internet » Internet » General
Computers and Internet » Internet » Information
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General
History and Social Science » Crime » True Crime
History and Social Science » Economics » General
History and Social Science » Politics » General
Reference » General
Religion » Comparative Religion » General
Science and Mathematics » Electricity » General Electronics

Phishing Exposed New Trade Paper
0 stars - 0 reviews
$64.95 In Stock
Product details 450 pages Syngress Publishing - English 9781597490306 Reviews:
"Synopsis" by , Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry.

Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today.

This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers.

* Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts

* Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic

* Stay one step ahead of the enemy with all the latest information

"Synopsis" by , Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry.
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.