Seven Deadliest Social Network Attacks

  • 2h 58m
  • Carl Timm, Richard Perez
  • Elsevier Science and Technology Books, Inc.
  • 2010

Do you need to keep up with the latest hacks, attacks, and exploits affecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Attacks detailed in this book include:

  1. Social Networking Infrastructure Attacks
  2. Malware Attacks
  3. Phishing Attacks
  4. Evil Twin Attacks
  5. Identity Theft
  6. Cyber Bullying
  7. Physical Threats
  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don’t be caught defenseless again, learn techniques to make your computer and network impenetrable

About the Authors

Carl Timm is the Regional Director of Security for Savvis, Inc. As Regional Director of Security, Mr. Timm is responsible for keeping up-to-date on security threats businesses experience and finding solutions that mitigate the threats. Mr. Timm has worked in the Information Security area for over 16 years providing security and IT governance consulting services for fortune 500 companies. Mr. Timm is also an industry recognized author, having authored multiple books on the topics of security and networking. Mr. Timm holds multiple industry certifications including the CCIE and PMP.

Richard Perez (CISSP#121490, CCNP, MCSE, SCSA, CCSE, CNE-3, ITIL) is a senior security, risk and architecture practice manager for Savvis, Inc. He currently provides strategic and technical consulting to clients in the Midwestern United States. His specialties include network and system security, enterprise architecture, business continuity, and disaster recovery. Richard holds a Bachelor's degree in Computer Science, a Master's degree in Information Technology, and is presently completing his Doctorate in Computer Science. He is a member of the Association for Computing Machinery (ACM), (ISC)2, and InfraGard.

In this Book

  • Social Networking Infrastructure Attacks
  • Malware Attacks
  • Phishing Attacks
  • Evil Twin Attacks
  • Identity Theft
  • Cyberbullying
  • Physical Threats