article thumbnail

The 7 Best Ransomware Books Available on Amazon

Solutions Review

The editors at Solutions Review have compiled the best ransomware books worth reading based on relevance, ratings, publish date, and ability to add business value. Below, you will find a library of the best ransomware books from recognized leaders, experts, and technology professionals in the field. OUR TAKE: This book from Nihad A.

Malware 98
article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book is all about the virus that sabotaged Iran’s nuclear efforts and shows how the existence of this malware can have the same destructive capability as a kinetic attack! There are a number of lessons and learning points I took away from Kim Zetter ‘s book. The final chapter looks at the morality of the attack.

Malware 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book is all about the virus that sabotaged Iran’s nuclear efforts and shows how the existence of this malware can have the same destructive capability as a kinetic attack! There are a number of lessons and learning points I took away from the book. The final chapter looks at the morality of the attack.

Malware 52
article thumbnail

Mastering Effective Cybersecurity Research: Going From Data to Actionable Insights

FS-ISAC

If we are more technical, we want to read about the latest malware, while business-focused individuals lean in on industry trends. Each of these objectives has unique questions and requires varied sources and metrics to provide comprehensive answers.

article thumbnail

Social Engineering = Fancy Job Title for Hackers

Online Computers

Most people are aware of terms like phishing and malware, but do you know those are a part of a larger scheme called social engineering? However, as soon as the thumb drive gets plugged in, it will infect your computer with malware. By clicking on it, you unintentionally downloaded malware to your computer. Spear Phishing.

Malware 52
article thumbnail

Ransomware’s Latest Targets and How to Protect Yourself

Pure Storage

Limiting the spread of malware. For the full picture, download the ESG e-book now. The idea of air gapping is to make backups unreachable to attackers. But is air gapping really the answer ? Air gaps can deliver enhanced protection by: Providing better security than traditional backup architecture.

Backup 105
article thumbnail

Understanding What Dark Web Scans Are & How They Can Protect You

Erwood Group

They also sell the tools needed to crack passwords, hack your systems, and launch attacks such as malware, ransomware, DDoS, and botnets. Why are these items for sale in the first place? Because they have value on the black market. While that may be obvious, what may surprise you is how much value some of this information is.

Banking 59