Bibliography for Chapter 6 – Ignorance is Risk

6.1 Introduction

  1. Piscitello, Dave. “A Visual Aid for Raising Social Engineering Awareness… and a Homework Assignment.” ‘The Security Skeptic’ 8 Mar. 2013. <http://securityskeptic.typepad.com/the-security-skeptic/2013/03/visual-aid-for-raising-social-engineering-awareness.html>.
  2. Wang, Abigail. “Infographic: Where Are You Most at Risk for Identity Theft?PCMAG. 6 Aug. 2013. <http://securitywatch.pcmag.com/identity/314442-infographic-where-are-you-most-at-risk-for-identity-theft>.

6.2 Understand Browser and URL fundamentals

  1. Anon. “The Curse of the URL Shorteners: How Safe Are They?Stopthehacker. 19 Feb. 2010. <http://www.stopthehacker.com/2010/02/19/analyzing-url-shorteners/>.
  2. Anon. “Short-URL Services May Hide Threats.” DataProtectionCenter. 26 July 2013. <http://www.dataprotectioncenter.com/antivirus/mcafee/short-url-services-may-hide-threats/>.
  3. Geer, David. “The Dangers of QR Codes for Security.” CSO. 19 Aug. 2013. <http://www.csoonline.com/article/738366/the-dangers-of-qr-codes-for-security>.
  4. Horowitz, Michael. “Steve Gibson’s Fingerprint Service Detects SSL Man in the Middle Spying.” Computerworld. 14 Apr. 2013. <http://blogs.computerworld.com/cybercrime-and-hacking/22050/steve-gibsons-fingerprint-service-detects-ssl-man-middle-spying>.
  5. Kishore, Aseem. “HTTPS, SSL and the Green Address Bar.” Online Tech Tips. 30 Mar. 2013. <http://www.online-tech-tips.com/computer-tips/ott-explains-https-ssl-and-the-green-address-bar/>.
  6. Marapana, Rukshan. “Unshortener – Shorten and SMS, Unshorten and Check Trust Score.” ITunes App Store. <https://itunes.apple.com/us/app/unshortener-shorten-unshorten/id546670927>.

6.3 Become a link guru

  1. Anon. “Avoiding Bad URLs in the Mobile Web – PDF Download.” Trend Micro. 2013. <http://about-threats.trendmicro.com/ebooks/avoiding-bad-urls-in-the-mobile-web/>.
  2. Anon. “Secure Url Checker.” Appspot. 2013. <https://secureurlchecker.appspot.com/>.
  3. Basu, Saikat. “8 Ways To Make Sure A Link Is Safe Before You Click It.” MakeUseOf. 14 Aug. 2012. <http://www.makeuseof.com/tag/8-ways-link-safe-click/>.
  4. Biersdorfer, J. D. “Q&A: Checking a Web Site’s Security.” Gadgetwise. 6 Mar. 2013. <http://gadgetwise.blogs.nytimes.com/2013/03/06/qa-checking-a-web-sites-security/?nl=technology>.

6.4 Recognize phishing attacks

  1. Anon. “Cybercriminals Target Apple IDs, Financial Credentials in Phishing Scams.” Acreditexpert. 13 July 2013. <http://acreditexpert.com/cybercriminals-target-apple-ids-financial-credentials-in-phishing-scams-inquirer-net/>.
  2. Anon. “Join the Fight against Phishing.” PhishTank. 2013. <http://www.phishtank.com/index.php>.
  3. Barwick, Hamish. “A Victim of the Nigerian Phishing Scam Tells Her Tale.” PCWorld. 26 May 2013. <http://www.pcworld.com/article/2039751/a-victim-of-the-nigerian-phishing-scam-tells-her-tale.html>.
  4. Dave, Paresh. “Email ‘phishing’ Attacks by Hackers Growing in Number, Intensity.” Los Angeles Times. 25 July 2013. <http://www.latimes.com/business/la-fi-phishing-attacks-20130726,0,2808913.story>.
  5. Faulkner, Jason. “Online Security: Breaking Down the Anatomy of a Phishing Email.” HowTo Geek. 13 Apr. 2011. <http://www.howtogeek.com/58642/online-security-breaking-down-the-anatomy-of-a-phishing-email/>.
  6. Goodchild, Joan. “9 Classic Hacking, Phishing and Social Engineering Lies.” Network World. 18 Mar. 2013. <https://www.networkworld.com/slideshow/91577/9-classic-hacking-phishing-and-social-engineering-lies.html>.
  7. Howard, Brian Clark. “Gone Phishing: How Major Websites Get Hacked.” National Geographic. 28 Aug. 2013. <http://news.nationalgeographic.com/news/2013/08/130828-new-york-times-hacked-syrian-electronic-army-twitter-phishing/>.
  8. Levinson, Meridith. “How to Tell If an Email Is a Phishing Scam.” CIO. 10 Apr. 2012. <http://www.cio.com/article/703977/How_to_Tell_If_an_Email_Is_a_Phishing_Scam>.
  9. Lin, Phil. “5 Tips to Keep Spear Phishers Out of Your Inbox.” Mashable. 11 July 2012. <http://mashable.com/2012/07/11/spear-phishing-email/>.
  10. Newhall, Christina. “4 Tips That Explain How To Avoid Phishing Scams and Email Spam.” Scambook Blog. 4 Sept. 2013. <http://www.scambook.com/blog/2013/09/4-tips-that-explain-how-to-avoid-phishing-scams-and-email-spam/>.
  11. Nguyen, Peter. “Don’t Fall Victim to These 7 Types of Phishing Scams.” HotSpotShield Blog. 15 Aug. 2013. <http://blog.hotspotshield.com/2013/08/15/common-phishing-scams/>.
  12. Omniquad Security Team. “LinkedIn Phishing Emails – How to Distinguish between a Phish and a Legitimate Email.” Omniquad Security Blog. 5 Mar. 2013. <http://omniquadsecurityblog.com/2013/03/05/linkedin-phishing-emails-how-to-distinguish-between-a-phish-and-a-legitimate-email/>.
  13. Stanescu, Bianca. “Barclays Clients Targeted by Phishers with 200 Fake Websites a Week.” HOTforSecurity. 8 Aug. 2013. <http://www.hotforsecurity.com/blog/barclays-clients-targeted-by-phishers-with-200-fake-websites-a-week-6846.html>.
  14. Wilson11, Tim. “Report: Four Out Of Five Phishing Attacks Use Security Scams.” Dark Reading. 11 Oct. 2012. <http://www.darkreading.com/insider-threat/167801100/security/attacks-breaches/240008441/report-four-out-of-five-phishing-attacks-use-security-scams.html>.
  15. Zeltser, Lenny. “Challenges of Anti-Phishing Advice, the Google Docs Edition.” Internet Storm Center. 19 Dec. 2012. <https://isc.sans.edu/diary.html?storyid=14731>.
  16. Zorz, Zeljka. “Learn by Doing: Phishing and Other Online Tests.” NetSecurity. 8 Feb. 2013. <https://www.net-security.org/secworld.php?id=14375>.

6.5 Recognize phony alerts

No citations

6.6 Use better ways to share files

  1. Ahmed, Waqas. “BitTorrent Sync Brings Its Two-Way P2P File Syncing To Android.” AddictiveTips. 18 July 2013. <http://www.addictivetips.com/android/bittorrent-sync-for-android/>.
  2. Dachis, Adam. “BitTorrent Sync Keeps Your Files In Sync, Skips the Insecure Cloud.” Lifehacker. 23 Apr. 2013. <http://lifehacker.com/bittorrent-sync-keeps-your-files-in-sync-skips-the-ins-478810621>.
  3. Khalid, Hamza. “BitTorrent Sync Comes To IPhone With Camera Roll Backup & P2P File Syncing.” AddictiveTips. 28 Aug. 2013. <http://www.addictivetips.com/ios/bittorrent-sync-for-iphone-camera-roll-backup-p2p-file-syncing/>.