Unmasking the Social Engineer: The Human Element of Security

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming.

  • Clearly combines both the practical and technical aspects of social engineering security
  • Reveals the various dirty tricks that scammers use
  • Pinpoints what to look for on the nonverbal side to detect the social engineer

Sharing proven scientific methodology for reading, understanding, and deciphering non-verbal communications, Unmasking the Social Engineer arms readers with the knowledge needed to help protect their organizations.

List price: $34.99

Buy from amazon.com

Don’t Step in the Trap: How to Recognize and Avoid Email Phishing Scams

More and more consumers and businesses are being victimized by increasingly sophisticated email scams, including “phishing” schemes. This handy, step-by-step guide, written in plain English, will show you how to recognize phishing emails. It will help you avoid being taken in by these scams, without having to decipher a lot of computer jargon. Includes quick reference guide and glossary.

List price: $5.49

Buy from amazon.com

Cybersecurity 101: What You Absolutely Must Know! – Volume 1: Learn How Not to be Pwned, Thwart Spear Phishing and Zero Day Exploits, Cloud Security Basics, and much more

Right now, this very moment, you don’t know it, but you are at war and the adversary is winning. Script kiddies, malicious hacktivists, state sponsored hackers and cyber mercenaries pose a critical and life altering threat landscape targeting you and your family. This isn’t some doom and gloom fear mongering enterprise; this is the new reality. Your social security number, banking information and even your health records have tremendous value and you’re offering all of this up on a silver platter to those with a malicious intent for its use.

 

What cybersecurity mechanisms do you have in place at home to protect your family and at work to protect critical data? Do you suffer from Nephophobia? Do you know what that is? How do you analyze a link and automatically know if it carries a virus that will corrupt your computer for easy access to hackers? What is spear phishing? Is your business a potential victim of a DDoS attack? You’ve heard about Zero Days but what are they? This book covers this and much more in an intentionally easy to read and recall format so that your online activity from email and password creation to web browsing and filling out online forms can be done in a secure manner. After reading this book series, basic cybersecurity will be second nature and your newly found cybersecurity hygiene will rub off on your family and peers.

 

This book covers topics such as: how to defend against Pwning, common Nephephobia, how to avoid being a victim to phishing attacks, overcoming DDOS attacks, how to block Zero Day exploits, how to thwart clickjacking, how to detect and protect against Malware and much more. Online courses that cover the topics in this series sell for $100’s of dollars. The author will take your hand and walk you through these technical topics so that on the conclusion of each book, you’ll have a working and virtually automatic comprehension of its contents.

 

The internet is here to stay and will continue to evolve. With the introduction and chaotic accelerated growth of the Internet of Things (IoT) online threats will only become more sophisticated and malicious. A baseline comprehension of ‘cyber self-defense’ is paramount and proper cybersecurity hygiene is essential to protecting yourself, your family and business from hackers and to thwart virtual threats that have gone viral. The technical components of cybersecurity can be tedious and intimidating but this book series is authored for those who aren’t tech gurus and need to learn powerful cybersecurity techniques quickly and easily without the intimidation of tech jargon or lofty terminology.

List price: $14.99

Buy from amazon.com

The Social Engineer’s Playbook: A Practical Guide to Pretexting

the-social-engineers-playbook-a-practical-guide-to-pretexting

The Social Engineer’s Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board and others. This book covers an introduction to tools, such as: Maltego, Social Engineer Toolkit, Dradis, Metasploit and Kali Linux among others. Crucial to any social engineering test is the information used to build it. Discover the most valuable sources of intel and how to put them to use.

List price: $17.09

Buy from amazon.com

Phishing Exposed

phishing-exposed

Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry.

Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today.

This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers.

* Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts
* Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic
* Stay one step ahead of the enemy with all the latest information

List price: $54.95

Buy from amazon.com

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

phishing-dark-waters-the-offensive-and-defensive-sides-of-malicious-emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program.

Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim’s computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay.

  • Learn what a phish is, and the deceptive ways they’ve been used
  • Understand decision-making, and the sneaky ways phishers reel you in
  • Recognize different types of phish, and know what to do when you catch one
  • Use phishing as part of your security awareness program for heightened protection

Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.

List price: $35.00

Buy from amazon.com

Phishing for Phools: The Economics of Manipulation and Deception

phishing-for-phools-the-economics-of-manipulation-and-deception

Ever since Adam Smith, the central teaching of economics has been that free markets provide us with material well-being, as if by an invisible hand. In Phishing for Phools, Nobel Prize-winning economists George Akerlof and Robert Shiller deliver a fundamental challenge to this insight, arguing that markets harm as well as help us. As long as there is profit to be made, sellers will systematically exploit our psychological weaknesses and our ignorance through manipulation and deception. Rather than being essentially benign and always creating the greater good, markets are inherently filled with tricks and traps and will “phish” us as “phools.”

Phishing for Phools therefore strikes a radically new direction in economics, based on the intuitive idea that markets both give and take away. Akerlof and Shiller bring this idea to life through dozens of stories that show how phishing affects everyone, in almost every walk of life. We spend our money up to the limit, and then worry about how to pay the next month’s bills. The financial system soars, then crashes. We are attracted, more than we know, by advertising. Our political system is distorted by money. We pay too much for gym memberships, cars, houses, and credit cards. Drug companies ingeniously market pharmaceuticals that do us little good, and sometimes are downright dangerous.

Phishing for Phools explores the central role of manipulation and deception in fascinating detail in each of these areas and many more. It thereby explains a paradox: why, at a time when we are better off than ever before in history, all too many of us are leading lives of quiet desperation. At the same time, the book tells stories of individuals who have stood against economic trickery–and how it can be reduced through greater knowledge, reform, and regulation.

List price: $24.95

Buy from amazon.com

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

phishing-and-countermeasures-understanding-the-increasing-problem-of-electronic-identity-theft

Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures.

List price: $122.00

Buy from amazon.com