As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power grid can be manipulated or sabotaged by terrorists.
But knowledge is power. In this easy-to-read, fascinating and fully illustrated book, you learn how hackers make money, and what they target - along with concrete, hands-on hints for fighting back, whether you’re a concerned parent or a top executive.
With all the surrounding threats, what better person to prepare the public, than a team of internationally known cybersecurity experts? Nick Selby is a police detective specializing in sharing intelligence and busting cybercriminals. He knows how these crimes happen, who does them, and how to make your life safer. In The Cyber Survival Manual he and a veritable brain trust of experts from the world of intelligence, digital currency, vehicle-hacking, and sophisticated crimeware, share the best techniques for everyone.
This indispensable, step-by-step guide to cyber defense includes:
Everyday security: How to keep your identity from being stolen, protect your kids, protect your cards and much more.
Big Stories: Silk Road, Ashley Madison, FBI vs. Apple, WikiLeaks, BitCoins, and what they mean to individuals and society at large.
Global issues: the NSA, how hackers can crash your car, and is China really planning to crash Google?
Crucial to surviving the worst the Internet can throw at you, The Cyber Survival Manual is the must-have book of the 21st century. Think you don’t need this book because, “I have nothing to hide”? Selby, along with Will Gragido, Eric Olson, Chris Valasek, and Heather Vescent, show you why you’re wrong (everyone now has something to hide) - and how lack of security can endanger your finances, your safety, and your reputation.
Table of Contents
CHAPTER 1: KEEP YOUR IDENTITY SAFE
CHAPTER 2: WHERE THE MONEY IS
CHAPTER 3: PROTECT YOUR PRIVACY ONLINE
CHAPTER 4: KEEP KIDS SAFE ONLINE
CHAPTER 5: THE INTERNET OF THINGS
CHAPTER 6: NOT JUST PHONING IT IN