Cyber Fraud

Regular price €142.99
A01=Rick Howard
advanced malware detection
API Function
attacks
Author_Rick Howard
Banking Trojan
browser
Carding Forums
Category=URH
code
Cyber Crime
Cyber Crimes Unit
Cyber Fraud
DDoS Tool
DNS Cache Poisoning
DNS Server
Drop Site
dynamic
eq_bestseller
eq_computing
eq_isMigrated=1
eq_isMigrated=2
eq_nobargain
eq_non-fiction
Exploit Kit
financial data theft
information assurance
Information Security Environment
IP Address
IPv4 Head
Kernel Driver
Keystroke Logging
library
link
malicious
Malicious Code
Mobile Malicious Code
money
Money Mules
mule
Outbound Channels
phishing
Phishing Attacks
Phishing Site
Post Request
Russian Business Network case studies
Spear Phishing Attacks
telecommunications infrastructure analysis
threat actor profiling
underground cyber economy
World Transfers

Product details

  • ISBN 9781420091274
  • Weight: 2400g
  • Dimensions: 174 x 246mm
  • Publication Date: 23 Apr 2009
  • Publisher: Taylor & Francis Ltd
  • Publication City/Country: GB
  • Product Form: Hardback
Delivery/Collection within 10-20 working days

Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock

10-20 Working Days: On Backorder

Will Deliver When Available: On Pre-Order or Reprinting

We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!

With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, Cyber Fraud: Tactics, Techniques, and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy.

Copiously illustrated, this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming, trojans and toolkits, direct threats, pump-and-dump scams, and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape, the book specifically examines telecommunications infrastructure development, patterns and trends of internet adoption and use, profiles of specific malicious actors, threat types, and trends in these areas.

This eye-opening work includes a variety of case studies ― including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network’s (RBN) role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell, and profit from the personal financial information of consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.

Verisign iDefense Security Intelligence Service, Dulles, Virginia, USA