Listen free for 30 days

Phishing Dark Waters

The Offensive and Defensive Sides of Malicious E-mails
Length: 5 hrs and 24 mins
Categories: Non-fiction, Technology
4.5 out of 5 stars (6 ratings)

£7.99/month after 30 days. Cancel anytime

Summary

An essential anti-phishing desk reference for anyone with an email address, Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed email or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program.

Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay.


Learn what a phish is, and the deceptive ways they've been used
Understand decision-making, and the sneaky ways phishers reel you in
Recognize different types of phish, and know what to do when you catch one

Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.

PLEASE NOTE: When you purchase this title, the accompanying reference material will be available in your Library section along with the audio.

©2015 John Wiley & Sons, Inc., Indianapolis, Indiana (P)2016 Audible, Inc.

What members say

Average customer ratings

Overall

  • 4.5 out of 5 stars
  • 5 Stars
    4
  • 4 Stars
    2
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0

Performance

  • 4.5 out of 5 stars
  • 5 Stars
    3
  • 4 Stars
    2
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0

Story

  • 4.5 out of 5 stars
  • 5 Stars
    4
  • 4 Stars
    1
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0
Sort by:
  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

Very practical - but mixed bag

This is a very practical book for those interested in Phishing and especially how to set up phishing-programmes in organisations to train and test people. The organisational training-aspect and tools for such processes makes up the latter part of the book.

The beginning is definitely the most useful, outlining different kinds of fraudulent emails including their backstories, MOs, telltale signs, etc.

The two authors each read their own parts. Unfortunately Hadnagy (the more practical of the two) tested my patience with "cool stories" and ventures into some unfortunate neurobabble and claims about how learning works, which is both unnecessary and jarring given Fincher's actual credentials in psychology. Thus parts of the book are good and practical advice on phishing-protection and useful introductions to different *levels" of fraudulent emails, and parts are neat (if basic) psychological primers - but there are also parts that reads like a spiel you'd get from a fast-talking consultant trying to make a sale.

Overall I'd recommend the book to anyone interested in what phishing is and how to aviod it - but depending on your practical needs and/or bullshit tolerance level you may want to skip some of the latter chapters.

Sort by:
  • Overall
    5 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Toms Pecis
  • Toms Pecis
  • 16-06-19

Good material, but...

woman voice is like a computer generated voice. same intonation and almost no excitement. Material is great, but this really kills the joy of listening this book.

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars
Profile Image for Kip Boyle
  • Kip Boyle
  • 06-06-18

Excellent book but more narrow than I needed

I purchased this book because I’m a security manager and I need to create a comprehensive anti-phishing program for my company. This book did an excellent job describing the people part of the program I need to create. But it did not give me enough information about the anti-phishing technologies and protocols, such as sender policy framework and DMARC. Nevertheless I’m going to use all the information provided. Thank you.

  • Overall
    5 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for DisposableGames
  • DisposableGames
  • 13-04-17

Highly recommended

This audio book is a must read (hear) for all people both IT and the "everyday" computer user. This is a engaging and easy to understand book that is important for people to take seriously with the growing threat of hacking.

Having been a IT professional for over 16 years, this book was filled with an amazing amount of information.