- 504 pages
- English
- PDF
- Available on iOS & Android
About This Book
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. This volume explores the state of threats present in the cyber fraud underground. It discusses phishing/pharming, trojans/toolkits, direct threats, and pump-and-dump scams. By examining the operations of the cyber criminal, the book provides perspective into the general incentives, risks, and behavioral patterns of the fraudsters. Armed with this information, organizations and individuals are better able to develop countermeasures and crafting tactics to disrupt the fraud underground and secure their systems.
Frequently asked questions
Information
Table of contents
- Front cover
- Contents
- Introduction
- PART I: UNDERGROUND CULTURE
- Chapter 1. Emerging Economic Models for Software Vulnerability Research
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques
- Chapter 3. The Cyber Threat Landscape in Russia
- Chapter 4. The Cyber Threat Landscape in Brazil
- Chapter 5. The Russian Business Network: The Rise and Fall of a Criminal ISP
- Chapter 6. Banking Trojans: An Overview
- Chapter 7. Inside the World of Money Mules
- PART II: UNDERGROUND INNOVATION
- Chapter 8. IFrame Attacks - An Examination of the Business of IFrame Exploitation
- Chapter 9. Distributed Denial of Service (DDoS) Attacks: Motivations and Methods
- Chapter 10. The Torpig Trojan Exposed
- Chapter 11. The Lagma Trojan*
- Chapter 12. Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks
- Chapter 13. SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse
- Chapter 14. Preventing Malicious Code from "Phoning Home"
- Chapter 15. Mobile Malicious Code Trends
- Epilogue
- Index
- Back cover