Social Penetration: Attacking the Human Side of the Internet

Author:   Mike Murray
Publisher:   Syngress Media,U.S.
ISBN:  

9781597496025


Pages:   284
Publication Date:   12 September 2011
Format:   Paperback
Availability:   Awaiting stock   Availability explained
The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you.

Our Price $105.47 Quantity:  
Add to Cart

Share |

Social Penetration: Attacking the Human Side of the Internet


Add your own review!

Overview

Social networking attacks are growing at an alarming rate. According to Symantec Internet Threat Report, over 95 percent of the top 25 threats required user interaction and spread through social means, which is bad news for the end-user and security professionals. Companies and end-users have a new attack vector to secure and that is the social network. Social networks like Facebook, LinkedIn and MySpace are used by over 350 million people, and often while they are in the workplace, both for work and play. This book delves into the current hot attacks that are being used by hackers to gain access to personal and company information and how security professionals can defend against them. The author fully details Web 2.0 attacks such as evil twin attacks, URL shortening attacks and micro-information leakage attacks. User vulnerabilities are exposed like the use of language patterns as well as writing tone and technical vulnerabilities are revealed such as XSS and XSRF as well as attacks against structural elements such as APTs, Flash and Java. The fast growing and newest addition to social networks, the microblogging site such as Twitter are also examined as are e-mail and instant messaging attacks. The in-depth coverage in this book is invaluable to penetration testers, security consultants, and sys/net admins. This title is the most up-to-date book on how attacks are propagated on Facebook, LinkedIn, and MySpace. It details how to secure yourself and your company from attacks via Twitter and other microblogging sites. It breaks down the anatomy of evil twin attacks, micro-information attacks, and social ad attacks.

Full Product Details

Author:   Mike Murray
Publisher:   Syngress Media,U.S.
Imprint:   Syngress Media,U.S.
ISBN:  

9781597496025


ISBN 10:   1597496022
Pages:   284
Publication Date:   12 September 2011
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Awaiting stock   Availability explained
The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you.

Table of Contents

Reviews

Author Information

Mike Murray has spent more than a decade helping companies large and small to protect their information by understanding their vulnerability posture from the perspective of an attacker. From his work in the late 90's as a penetration tester and vulnerability researcher to leadership positions at nCircle, Neohapsis and Liberty Mutual Insurance Group, his focus has always been on using vulnerability assessment through penetration testing and social engineering to proactively defend organizations. Mike is currently a managing partner of MADSecurity, where he leads engagements to help corporate and government customers understand and protect their security organization. He is also in charge of the advanced curriculum of The Hacker Academy, where he trains security professionals on the newest methods of computer penetration testing and social engineering to help them better protect their organizations. Mike's career was originally focused on the technical side of security. He has written technical articles in publications including Sys Admin and CISSPWorld, as well as discovering published and unpublished vulnerabilities in multiple platforms. His years of experience as a vulnerability researcher and leader of research teams have convinced him that the most important system to focus on in information security is the human and organizational systems, and Mike has most recently focused on research into exploitation of those systems. Mike's talks about how to build a great career in security have been seen at major conferences like RSA and Defcon, and his work on advanced social engineering has been widely recognized. Mike's thoughts on security and social engineering can be found on his blogs at Episteme.ca and TheHackerAcademy.com, and his work on helping build careers can be found at TheConnectedCareer.com and InfoSecLeaders.com.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List