Seven Deadliest Social Network Attacks

Paperback
from $0.00

Author: Carl Timm

ISBN-10: 159749545X

ISBN-13: 9781597495455

Category: Security - Computer Networks

Do you need to keep up with the latest hacks, attacks, and exploits affecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your...

Search in google:

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.Attacks detailed in this book include:Social Networking Infrastructure AttacksMalware AttacksPhishing AttacksEvil Twin AttacksIdentity TheftCyber BullyingPhysical ThreatsKnowledge is power, find out about the most dominant attacks currently waging war on computers and networks globallyDiscover the best ways to defend against these vicious attacks; step-by-step instruction shows you howInstitute countermeasures, don’t be caught defenseless again, learn techniques to make your computer and network impenetrable

About the Authors ixAcknowledgments xiIntroduction xiiiChapter 1 Social Networking Infrastructure Attacks 1Bringing the Social Networks to Their Knees 1What Happened to the Social Networks? 2Distributed Denial-of-Service Attacks 3Owning the Social Network 8How Could This Happen? 8Saving the Social Networks and Ourselves 16The Floodgates Have Opened, What Do I Do? 16Beating the Bot 19Cutting the Strings 21Summary 21Chapter 2 Malware Attacks 23Malware Defined 24Understanding the Types of Malware 24Cross-Site Scripting Explored 27Dissecting Cross-Site Scripting 29Introducing Cross-Site Request Forgery 33Cross-Site Request Forgery Explored 35Protecting Yourself 36Mitigating Malware 36Mitigating Cross-Site Scripting Attacks 38Mitigating Cross-Site Request Forgery Attacks 39Summary 40Endnotes 41Chapter 3 Phishing Attacks 43Phishing Attack Scenarios against Social Networks 44What Happened? 47How Did It Occur? 48What Were the Repercussions? 48Phishing Attack against MySpace 51Phishing Attack against Twitter 51How to Mitigate a Phishing Attack 55Take No Immediate Action 56Examine the Message 57Validate the Source 57Take the Offensive 58Safeguard Your Computers 59Ask for Help 59Future Outlook of Phishing Attacks 60Summary 61Endnotes 61Chapter 4 Evil Twin Attacks 63Evil Twin Attacks Defined 64Creating the Evil Twin 66Protecting Ourselves and the Ones We Love 73Don't Befriend the Evil Twin 73Don't Become an Evil Twin 74Summary 81Endnotes 82Chapter 5 Identity Theft 83The Art of Dumpster Diving 83Profile of an Identity Thief 84How Did Nelson Do It? 84Consequences of Stealing Identities 84Identity Theft via Facebook 85Identity Theft through Social Networking 85Clues to How Bryan's Facebook Account Was Hijacked 87Repercussions of Having Your Facebook ID Stolen from You 88Methods to Prevent Identity Theft 89Avoid Password Reusage 90Have Secondary E-Mail Address Handy 92Shred Your Documents 92Limit Your Liability 92What to Do if Your Identity Is Compromised 93Freeze All of Your Assets 94Initiate a Fraud Alert on Your Credit Reports 94Notify the Local Police 94Notify the Federal Trade Commission 95Document and Retain Records! 95Continuously Monitor Your Credit Report 95The Future of Identity Theft 96Summary 97Endnotes 98Chapter 6 Cyberbullying 99Cyberbullying Tragedy of Megan Meier via MySpace 100Why Was Megan the Target of Cyberbullying? 101What Was the Outcome of This Tragic Event? 102How to Deal with Cyberbullying 102Steps toward Fighting Cyberbullying 103Cyberbully Tools of the Trade 106How to Deal with Cyberbullying in the Gaming and Virtual Worlds 107What to Do about Griefers 108Workplace Bullying 109What Can Be Done about Workplace Bullying? 110What Is the Future of Cyberbullying? 110Summary 112Endnotes 112Chapter 7 Physical Threats 113Physical Threats against Your Company 114Bypassing Physical Security Controls 114Protecting Your Company 116Physical Threats against Your Person 118Jasper Howard: Murder and Online Threats 119Protecting Yourself 120Take Action 121Notify the Attacker 121Notify the Appropriate Authorities 122Be Open to Suggestions 123Preventative Measures to Physical Threats 123Background Checks 124Future Outlook to Physical Threats on Social Networks 126Summary 127Endnotes 129Index 131