Categories Corporate
home.book.professional_ebook

Cyber Scams and You! Volume 2

Learn how to Protect Yourself and Your Work from Cybercrime

51
Language:  English
Don’t be a victim of cybercrime. Understand how scams work and how to protect yourself.
book.buy.professional_plus_subscription.after
Эту книгу можно прочесть на нашей онлайн-платформе. Без рекламы.
Описание
Содержание

Don’t be a victim of cybercrime. Learn how to identify various Cyberscams function and how to protect yourself. Various topics include the history and psychology of scams. How to protect your digital accounts before you are a victim and what to do if you are a victim.

About the Author

  Howard Kier is a currently a web developer in Chicago, Illinois. He started his career at IBM after earning a B.S Computer Engineering and M.S Computer Engineering from Syracuse University. While working at IBM, Howard earned his M.B.A from Southern Methodist University where he was inducted into Beta Gamma Sigma, the National Honor Society for Business students. After earning his M.B.A, Howard worked at Electronic Data Systems (now HP Solutions), as a consultant.  Tiring of the corporate culture, Howard left EDS, to start his own company. After twelve successful years, he found himself spending more time counseling other business owners rather than on his own business. At that time, Howard redirected his company to provide consulting services. He spent a year as a consultant at Legacy Analytics and left when offered his current position. Throughout his career, Howard has consistently learned about current threats to computer systems after working with other IBM programmers and developers to stop the first computer virus and denial of service attack. Tired of seeing innocent people being taken advantage of via various cybercrimes, Howard decided to write these 2 volumes to educate the general public.  Howard is the author of numerous LinkedIn articles on a variety of business subjects. This is his first book.

  • Introduction
  1. Passwords
    1. Sample Breach
    2. Protecting Passwords
    3. Password Managers
    4. Multifactor Authentication
    5. Code Phishing
    6. Old Accounts
    7. SIM Swapping
  2. Phishing Websites
    1. Shortened URLs
    2. Instant Payments “Reversal” Scam
    3. More on URLs
    4. Another URL Twist
    5. QR Codes
    6. Class Action Lawsuit Scam
  3. Good Web Sites, Bad Apples
    1. Fake Job Listings
    2. On-Line Dating
    3. Sextortion
    4. Cryptocurrency
    5. The Con Artist Seller
    6. The Con Artist Buyer
    7. Real Estate Scams
    8. Credit repair
    9. Surveys
  4. What’s Next
  • Appendix A: Real FBI Cyber Warnings
  • Appendix B: Additional Scam Emails
  • Endnotes
home.book.about_author