Free Downloads
Phishing Dark Waters: The Offensive And Defensive Sides Of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.

File Size: 13955 KB

Print Length: 192 pages

Page Numbers Source ISBN: 1118958470

Publisher: Wiley; 1 edition (March 18, 2015)

Publication Date: March 18, 2015

Sold by:  Digital Services LLC

Language: English


Text-to-Speech: Enabled

X-Ray: Not Enabled

Word Wise: Not Enabled

Lending: Not Enabled

Enhanced Typesetting: Not Enabled

Best Sellers Rank: #649,792 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #61 in Books > Computers & Technology > Networking & Cloud Computing > Data in the Enterprise > Electronic Data Interchange (EDI) #1003 in Kindle Store > Kindle eBooks > Computers & Technology > Networking > Networks, Protocols & API's #2487 in Books > Computers & Technology > Security & Encryption

This is more than just a good book - this is an important book, one that everyone who uses the Internet, email, or social media (and that pretty much means just about everyone alive) should read. Chris Hadnagy and Michele Fincher have done a wonderful job of taking a complex topic and explaining it in an enjoyable and understandable way, using personal anecdotes (and sometimes even humor) to get the point across. In a way, this is a psychology textbook -- one that deals with the psychologies of phishing and of victimhood, and one that teaches readers that if they learn to stop acting and thinking like victims, they're much less likely to become victims. In fact, it really should be a textbook, because in this day and age, it ought to be required reading.

Another extremely useful reference book by Chris Hadnagy and Michele Fincher - the two best known experts in social engineering.SE is the most common way attackers gain access to your data and networks. Every information security professional needs to understand the way that happens and what they can do to combat the threat.This book is very well written, loaded with timely and pertinent examples and a condensed version of the knowledge and experience of the leading experts in thsi subject. A must read for InfoSec practitioners at all levels as well as anyone building an security awareness training program.

The only thing that I did not care for was that it was not long enough. Tons of information that everyone should read and be made aware of before something happens to them. It happened to my father who does not use the computer very much. He got his first laptop a few years ago and I helped him set it up, email, etc... and told him not to fall for the scams. He looked at me like I was crazy. A month later he calls in a panic that his computer locked up and he can’t figure out what is wrong. So I go over there where he finally admits that he clicked on an email that "looked so real" and started entering info. Thank God he did not enter anything too incriminating and after what seemed liked forever we had cleared up his problem. I never fall for it but I have come close several times. I think we all have at one point or another.Great read that I would recommend for anyone which works on a computer in any form which is most of the world. I kept thinking about what my Dad said to me while I was reading the book..."but it seemed so real......”

The book is written at a very introductory level giving the basic details of what a phish is, the mental stimulus behind a phishing email in order for it to work, the levels of emails, how to create a program, policy, tools, etc. I believe it did a fine job at being able to explain the inevitable phishing emails for any reader. Executives, analysts, and non-technical people could all learn something from this book.Some of the examples were out there and kind of made the idea obscure. I would suggest the read for anyone who wants to learn the introductory point of phishing and how to educate yourself and your users

Chris Hadnagy is simply the go-to, credible expert on social engineering. This book, like his others, is worth more than the cost. I rarely give reviews, and I'm a harsh critic -- so factor that into the 5-star rating.

The authors' experience in social enginnering, training and writing shine a compelling light on internet criminals, how they manipulate us, and how we can protect ourselves. I bought the book as part of a research project for work, and enjoyed it so much I read it through without stopping. How rare is that? Interesting, even entertaining, and full of insight, it focused scattered thoughts about social engineering (manipulation) which anyone with an email account has seen, and offered common-sense reaction and training advice to avoid this increasing crime epidemic. I will be referencing this book often. Well done!

Phishing Dark Waters is a great book to assist you in starting / improving your Security Awareness Program. I enjoyed how Chris and Michele brought real world examples to lite. I've attended both classes and lectures given by Chris and Michele and as I was reading the book I could look back and reference discussions and issues that were discussed.This is a must have for anyone in Cyber Security as well as anyone building a Security Awareness Program.

I happen to buy this book at a conference that Mr Hadnagy was speaking at. This book is wonderful, even better than wonderful it is outstanding. I am currently using this book to help build a training class for my end users on phishing. It contains a lot of useful information. I recommend this book for everyone in IT's library​.

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Offensive and Defensive Lawfare: Fighting Civilization Jihad in America's Courts (Civilization Jihad Reader Series Book 7) Offensive and Defensive Lawfare: Fighting Civilization Jihad in America's Courts (Civilization Jihad Reader Series) (Volume 7) Phishing Exposed Homemade Soda: 200 Recipes for Making & Using Fruit Sodas & Fizzy Juices, Sparkling Waters, Root Beers & Cola Brews, Herbal & Healing Waters, Sparkling ... & Floats, & Other Carbonated Concoctions Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing Windows Vista Security: Securing Vista Against Malicious Attacks Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Inside Inbox by Gmail: Google's New Guide to Taming Your Emails and Organizing Your Life Quickly and Easily Manage your Emails and Calendar easily with Mozilla Thunderbird I'll Go Home Then, It's Warm and Has Chairs. The Unpublished Emails. Follow up Email messages that win!: How to get your sales emails opened! Dark Fetishes Vol. 1 : (DARK EROTICA): Taboo Erotica (DARK EROTICA SERIES) Under Dark Waters: The Life and Distressed Times of a Commercial Diver Under Dark Waters College Football Schemes and Techniques: Defensive Field Guide The Farnam Method of Defensive Shotgun and Rifle Shooting Defensive Security Handbook: Best Practices for Securing Infrastructure The Weather-Resilient Garden: A Defensive Approach to Planning & Landscaping Defensive Pistol Fundamentals