Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Linked e-resources

Details

Intro; Acknowledgments; Introduction; All Aboard?; My Youth and Technology; First Experiences, First PC; The Malware Train Had Left the Station; My Years as an Evangelist; Disclaimer; Contents; About the Author; Chapter 1: Thirty Years of Malware: A Short Outline; 1.1 What Is Malware?; 1.2 What Is a Virus?; 1.3 The First Generation; 1.4 Generation Internet; 1.5 The Mobile Generation; 1.6 Finally; Chapter 2: Malware Author Profiles; 2.1 The Graffiti Sprayer and Script Kiddies; 2.2 Cybercriminals; 2.3 Malicious by Ignorance, Not by Design; 2.4 The Authorities and Government Departments

2.5 And What About the Hacktivists?2.6 Gigabyte: Made in Belgium; 2.7 Virus Developers and Virus Hunters; Chapter 3: The Digital Underground Economy; 3.1 How Is the Digital Underground Economy Organized?; 3.2 Is Everything for Sale?; 3.3 How a Mass Attack Works: Botnets and Their Structure; 3.4 And What About the Victim?; 3.5 Conclusion: E-crime Is on the Rise; Chapter 4: From Cyberwar to Hacktivism; 4.1 Cyberwar; 4.1.1 The Cloud as a Battlefield?; 4.1.2 Stuxnet; 4.2 Cyberterrorism; 4.3 Hacktivism; 4.4 Cyberespionage; 4.4.1 Stuxnetś Relatives; 4.5 Last but Not Least

4.6 Some (Final) Final ThoughtsChapter 5: The Antivirus Companies; 5.1 The Manufacturer; 5.2 Nonprofit Organizations in the Fight Against Cybercrime; 5.2.1 CARO; 5.2.2 EICAR; 5.2.3 AMTSO; 5.2.4 The WildList; 5.2.5 Test Sites; 5.2.6 Other Organizations and Services; Chapter 6: Todayś Threats; 6.1 Botnets; 6.2 Ransomware; 6.3 Social Networks; 6.4 Portable Media; 6.5 Attack and This Time on Businesses!; 6.6 Mobile Targets; 6.7 Online Banking: Beware of the Man-in-the-Browser; 6.8 PUPs, PUS, and PUAs; 6.9 Cryptocurrency and Cryptojacking: Virtual Currency and Real Criminals

Chapter 7: Malware Myths7.1 Myth 1: If I Do Not Notice Anything Suspicious on My Computer, It Is Not Infected; 7.2 Myth 2: There Is Absolutely No Need for Expensive Security Software. There Are Free Programs That Are At Least as Good!; 7.3 Myth 3: Most Malicious Software Is Sent as an Email Attachment; 7.4 Myth 4: My PC or Network Cannot Be Harmed by My Visiting a Website, If I Dont́ Download Anything; 7.5 Myth 5: Malware Is Most Commonly Downloaded Through Peer-to-Peer and Torrent Sites

7.6 Myth 6: Visiting a Porn Site Is More Likely to Result in Being Attacked by Malware than Looking at a Page About Equestrian...7.7 Myth 7: If I Do Not Open an Infected File, It Can't Do Any Harm; 7.8 Myth 8: Most Malicious Software Is Distributed via USB Sticks; 7.9 Myth 9: I Can Save Myself the Expense of Security Software or Hardware, Because I Know My Way Around and Only Visit Safe W...; 7.10 Myth 10: My PC Holds No Valuable Data-So Why Would Anyone Attack It?; 7.11 Myth 11: My PC Doesnt́ Run Windows, So It Is Quite Safe; 7.12 Myth 12: Malware Is Written by Antivirus Vendors

Browse Subjects

Show more subjects...

Statistics

from
to
Export