Scams, Security and Over-Sharing: Controlling your information and staying safe online
- Length: 140 pages
- Edition: 1
- Language: English
- Publication Date: 2021-08-21
- ISBN-10: B09DBY7ZJF
- Sales Rank: #0 (See Top 100 Books)
Many of us live our whole lives online. It’s where we shop, order food, chat with friends, watch movies, listen to music, book travel, bank and so much more. Yet little do many of us realise how open we are being about our lives and with our information. The problem we face however, is that no matter how cautious we are with what we actively put online ourselves, we’re never going to be 100% secure no matter what we do.
This book isn’t about cybersecurity, it’s about life. Specifically, connected life in the 21st century. It’s about the behaviours we need to change and the threats we need to be aware of to ensure that we can keep ourselves and our families as safe as possible in the new connected world.
We are the pioneers in connectivity and this world is evolving in a way that none of us has ever seen before.
Jon White tackles elements of 21st century life which will be familiar to all consumers – from social media, to email hacking, to content theft, to connected devices and even connected cars. The book steers clear of just dryly delivering facts but uses true anecdotes to tell stories of the dangers of connectivity to us all, every day, and how we can make simple changes to live our connected lives more safely.
Scams, Security and Over-sharing provides honest, jargon-free advice on how to keep your data safe in an increasingly complex digital world.
Copyright Disclaimer Contents Introduction Part One - Threats we can’t Control 1: Once More Unto the Data Breach 2: My Email’s Been Hacked, it’s no Big Deal, Right? 3: The Death of the Password 4: What’s the Most Dangerous Type of Engineer? A Social Engineer 5: Fooling you into Downloading Malicious Software? There’s an App for That 6: You don’t know it, but your Computer is Being Controlled by Someone Else Part Two - Information we can Try to Control 7: Data and Goliath 8: Am I Being Followed from a Cell Phone to Cyberspace 9: The Price of Free is your Data, is it a Fair Price? 10: Terms of Service - do you know what you’ve Agreed to? 11: The Truth, the Whole Truth and Everything Except the Truth 12: Intimacy is not Something you want with People you’ve Never Met Part Three - Contemporary Trends and Risks 13: A Recruiters’ Dream can be a Business’ Nightmare 14: Smart Speaker, are you Recording any of this? 15: From Car Jackers to Car Hackers 16: The Internet of which we do not Speak 17: The Real Cost of Free Illegal Streams 18: Short Debates of the Present and Future Conclusion: Can you find a Balance? Notes Appendix 1: Examples of ‘scam’ and Real Emails Appendix 2: Jargon Buster About the Author
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.