Stupid Ways People are Being Hacked!
()
About this ebook
Statistics presented by police departments in many countries around the world show that computer crimes are increasing fast, and these crimes can affect you. 47% of the total cybercrimes in Iran were related to unauthorized withdrawals from people's bank accounts.
Cybercrimes in Germany rose to a record level in 2013 to 64,500 cases, but only one in four crimes are solved. In addition, police unions believe that as many as 90 percent of internet crimes go unreported.
These statistics show that there is a necessity to remind users of the common practices of committing cyberspace crimes.
Related to Stupid Ways People are Being Hacked!
Related ebooks
Hacking for Everyone?: An Introduction to Cyber Security Rating: 0 out of 5 stars0 ratingsCyber Protect Your Business Rating: 0 out of 5 stars0 ratingsHack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratingsGINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Rating: 0 out of 5 stars0 ratingsHacking Your Destiny Rating: 0 out of 5 stars0 ratingsThe Robots Among Us Rating: 0 out of 5 stars0 ratingsDeveloper Relations: How to Build and Grow a Successful Developer Program Rating: 0 out of 5 stars0 ratingsGuide To Hookah Culture: Preparation and Health Effects Rating: 0 out of 5 stars0 ratingsA Genius Mental Health Hack For Men Rating: 0 out of 5 stars0 ratingsMaster of Ceremonies: A Male's Guide for a Successful Life Rating: 5 out of 5 stars5/5How to Do Growth Hacking - A Practical Guide Rating: 0 out of 5 stars0 ratingsPersonal Power: Connecting to the Creative Force Within Rating: 0 out of 5 stars0 ratingsHow to Live on 24 Hours a Day & The Game of Life and How to Play It Rating: 0 out of 5 stars0 ratingsWorking the Crowd: Social media marketing for business Rating: 5 out of 5 stars5/5Confessions of an Identity Thief Rating: 0 out of 5 stars0 ratingsMost by Nature Rating: 0 out of 5 stars0 ratingsBeautiful Body: Be Fit and Achieve That Great Body Rating: 0 out of 5 stars0 ratingsThe Best Fundraiser in America Rating: 0 out of 5 stars0 ratingsThe Player: Life is a Gamble Rating: 0 out of 5 stars0 ratingsThe Silence of Your Name: The Afterlife of a Suicide Rating: 0 out of 5 stars0 ratings101 Completely Made Up Untrue Facts Rating: 0 out of 5 stars0 ratingsThe Ontological Recipe to be Oneself Rating: 0 out of 5 stars0 ratingsSimple Pleasures: Thoughts on Food, Friendship, and Life Rating: 0 out of 5 stars0 ratingsFighting Nightmares Rating: 0 out of 5 stars0 ratingsEverything You Should Know About Startup: 121 Foundational Concepts for Every Entrepreneur Rating: 0 out of 5 stars0 ratingsPersonal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsGetting Even: Revenge is Fun, #1 Rating: 0 out of 5 stars0 ratingsWhat You Don’t Know: AI’s Unseen Influence on Your Life and How to Take Back Control Rating: 0 out of 5 stars0 ratingsSecret Spy Hacks Rating: 0 out of 5 stars0 ratingsIan Talks Hacking A-Z Rating: 0 out of 5 stars0 ratings
Computers For You
Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsMaster Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsSQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsUltimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5Learning the Chess Openings Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5The Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5User Friendly: How the Hidden Rules of Design Are Changing the Way We Live, Work, and Play Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5AP® Computer Science Principles Crash Course Rating: 0 out of 5 stars0 ratingsStorytelling with Data: Let's Practice! Rating: 4 out of 5 stars4/5
Reviews for Stupid Ways People are Being Hacked!
0 ratings0 reviews
Book preview
Stupid Ways People are Being Hacked! - Pasha Naserabadi
Naserabadi
Introduction
Imagine a life without computer and networks!
In the world we live in, it is impossible to escape technology. Meanwhile, Information Technology (IT) is the foundation for today’s living.
However, the same thing that can benefit us can also hurt us, unless we learn how to protect ourselves against cyber dangers.
How dangerous can cyber threats be?
Different aspects of using the internet and social networks have resulted in the replacement of traditional communication methods with electronic tools, which deliver mail, audio, images and documents in just a minute.
Despite the many advantages of electronic services, they have also created new risks – including security threats against our information.
Sometimes that information has priceless value and we never realize the value before losing them.
Here, there is an opportunity to learn more about some of the security threats.
Every day we read a lot of news about information having been stolen, including even top-secret political or financial information.
According to the information revealed by Edward Snowden, a former employee of the CIA, a black budget of $52.6 billion was set aside for US spy operations just in 2013. Among the biggest priorities for the intelligence community, are "Offensive Cyber Operations" and research devoted to decoding encrypted communications.
It shows the importance of cybersecurity indeed. In addition, a massive cyber war is going on in the world – aside from the spying tools surrounding us – which can be harmful in our lives and in business. Following are some incidents that can explain further.
Some real incidents
Snowden says Israel, U.S. Created Stuxnet Virus that Attacked Iran
(Haaretz, 9 July 2013)
Whistleblower Edward Snowden told a German magazine that Israel and the United States created the Stuxnet computer virus that destroyed nuclear centrifuges in Iran.
Stuxnet in 2010 wrought havoc on equipment at Iran’s Natanz nuclear plant and complicated the manufacture of highly enriched uranium, which the West suspects is intended for making atomic weapons.
The virus temporarily disabled 1,000 centrifuges being used by the Iranians to enrich uranium.
Snowden, a former technical contractor for the NSA and employee of the CIA, last month revealed the existence of mass surveillance programs by the United States and Britain against their own citizens and citizens of other countries.
Cyber-attack Could Cost Sony Studio as Much as $100 million
(Reuters, 9 December 2014)
Sony Corp’s movie studio could face tens of millions of dollars in costs from the massive computer hack that hobbled its operations and exposed sensitive data, according to Cyber-Security experts who have studied past breaches.
The tab will be less than the $171 million Sony estimated for the breach of its PlayStation Network in 2011 because it does not appear to involve customer data, the experts said.
Mark Rasch, a former federal cybercrimes prosecutor, said: Losses in that range would not mean a big financial setback to Sony Pictures Entertainment. However, other effects, such as the loss of trade secrets, will be difficult to measure. Hackers have released the proof of documents that include contracts and marketing plans that could influence competitors’ strategies.
Malware Implicated in Fatal Plane Crash
(NBC news, 20 August 2010)
Computer monitoring system was infected with Trojan horse, authorities say!
Authorities investigating the 2008 crash of Spanair flight 5022 have discovered a central computer system used to monitor technical problems in the aircraft was infected with malware. An internal report issued by the airline revealed the infected computer failed to detect three technical problems with the aircraft, which if detected, may have prevented the plane from taking off, according to reports in the Spanish newspaper, El Pais.
Flight 5022 crashed just after takeoff from Madrid-Barajas International Airport two years ago today, killing 154 and leaving only 18