Catégories Fixation des prix Corporatif
Livre électronique professionnel

Cyber Scams and You! Volume 2

Learn how to Protect Yourself and Your Work from Cybercrime

Langue:  English
Don’t be a victim of cybercrime. Understand how scams work and how to protect yourself.
Abonnement Pro Plus gratuit pour les 30 premiers jours, puis $8.99/mois
Lisez ce livre avec notre eReader, sans pubs

Don’t be a victim of cybercrime. Learn how to identify various Cyberscams function and how to protect yourself. Various topics include the history and psychology of scams. How to protect your digital accounts before you are a victim and what to do if you are a victim.

About the Author

  Howard Kier is a currently a web developer in Chicago, Illinois. He started his career at IBM after earning a B.S Computer Engineering and M.S Computer Engineering from Syracuse University. While working at IBM, Howard earned his M.B.A from Southern Methodist University where he was inducted into Beta Gamma Sigma, the National Honor Society for Business students. After earning his M.B.A, Howard worked at Electronic Data Systems (now HP Solutions), as a consultant.  Tiring of the corporate culture, Howard left EDS, to start his own company. After twelve successful years, he found himself spending more time counseling other business owners rather than on his own business. At that time, Howard redirected his company to provide consulting services. He spent a year as a consultant at Legacy Analytics and left when offered his current position. Throughout his career, Howard has consistently learned about current threats to computer systems after working with other IBM programmers and developers to stop the first computer virus and denial of service attack. Tired of seeing innocent people being taken advantage of via various cybercrimes, Howard decided to write these 2 volumes to educate the general public.  Howard is the author of numerous LinkedIn articles on a variety of business subjects. This is his first book.

  • Introduction
  1. Passwords
    1. Sample Breach
    2. Protecting Passwords
    3. Password Managers
    4. Multifactor Authentication
    5. Code Phishing
    6. Old Accounts
    7. SIM Swapping
  2. Phishing Websites
    1. Shortened URLs
    2. Instant Payments “Reversal” Scam
    3. More on URLs
    4. Another URL Twist
    5. QR Codes
    6. Class Action Lawsuit Scam
  3. Good Web Sites, Bad Apples
    1. Fake Job Listings
    2. On-Line Dating
    3. Sextortion
    4. Cryptocurrency
    5. The Con Artist Seller
    6. The Con Artist Buyer
    7. Real Estate Scams
    8. Credit repair
    9. Surveys
  4. What’s Next
  • Appendix A: Real FBI Cyber Warnings
  • Appendix B: Additional Scam Emails
  • Endnotes
A propos de l'auteur

Howard Kier