Shamane Tan advises C-Suite on uplifting their cyber risk and corporate security posture.
She is an international speaker and Founder of Cyber Risk Meetups, a platform for security executives to share innovative insights and war stories.
Catherine Matthews, nineteen years old, has a unique gift: the ability to manipulate the net with her neural implant. Yanked out of her perfectly ordinary life, Catherine becomes the last firewall standing between Adam and his quest for world domination.
PRAISE FOR THE LAST FIREWALL
“Awesome near-term science fiction.” – Brad Feld, Foundry Group managing director
“An insightful and adrenaline-inducing tale of what humanity could become and the machines we could spawn.” – Ben Huh, CEO of Cheezburger
“A fun read and tantalizing study of the future of technology: both inviting and alarming.” – Harper Reed, former CTO of Obama for America, Threadless
"A fascinating and prescient take on what the world will look like once computers become smarter than people. Highly recommended." – Mat Ellis, Founder & CEO Cloudability
“A phenomenal ride through a post-scarcity world where humans are caught between rogue AIs. If you like having your mind blown, read this book!” – Gene Kim, author of The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
According to Einstein, “There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY”. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes”.
This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can’t prevent fully but can minimize the chances of being a victim.
It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!
I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.
Classification of Hackers
Why do they hack?
Phases of Hacking
Methods of Hacking and Preventive Actions
Denial of Service (Dos Attack)
XSS (Cross site Scripting)
Cross Site Request Forgery, CSRF
Man In The Middle, MITM
Bonus: Google Hacking Tools that assist Hackers
Prevention from Hackers
Laws and Liabilities in India
Aadhaar data breach – January
Facebook data breach – March
Facebook data breach – Sep
Yahoo! Data breaches – August
LinkedIn breach – May