Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright
Disclaimer
Contents
Introduction
Part One - Threats we can’t Control
1: Once More Unto the Data Breach
2: My Email’s Been Hacked, it’s no Big Deal, Right?
3: The Death of the Password
4: What’s the Most Dangerous Type of Engineer? A Social Engineer
5: Fooling you into Downloading Malicious Software? There’s an App for That
6: You don’t know it, but your Computer is Being Controlled by Someone Else
Part Two - Information we can Try to Control
7: Data and Goliath
8: Am I Being Followed from a Cell Phone to Cyberspace
9: The Price of Free is your Data, is it a Fair Price?
10: Terms of Service - do you know what you’ve Agreed to?
11: The Truth, the Whole Truth and Everything Except the Truth
12: Intimacy is not Something you want with People you’ve Never Met
Part Three - Contemporary Trends and Risks
13: A Recruiters’ Dream can be a Business’ Nightmare
14: Smart Speaker, are you Recording any of this?
15: From Car Jackers to Car Hackers
16: The Internet of which we do not Speak
17: The Real Cost of Free Illegal Streams
18: Short Debates of the Present and Future
Conclusion: Can you find a Balance?
Appendix 1: Examples of ‘scam’ and Real Emails
Appendix 2: Jargon Buster
About the Author
Notes
← Prev
Back
Next →
← Prev
Back
Next →