Hacked Again

[Pages:100] Hacked Again

Scott N. Schober

Copyright ? 2016 by Scott N. Schober

Publishing

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the written prior permission of the author.

ISBN: 978-0-9969022-2-9

Table of Contents

Foreword Introduction Part 1: Learning the Hard Way

Chapter 1: Cash in the Mattress Chapter 2: Opting into Credit Card Fraud Chapter 3: Hacked Again: Time for a New Bank Chapter 4: Website Security Tested Chapter 5: TWITTER TARGETED

Part 2: Lessons Learned: How to Protect Yourself

Chapter 6: Lockpicking the Brain Chapter 7: Beware of the "Wares" Chapter 8: Identity Theft Chapter 9: Canned Spam Chapter 10: Gone Phishing and Spoofing Chapter 11: Strong Passwords Trump Lazy Hackers Chapter 12: Garden-Variety Hackers Chapter 13: What Color Hats Can Hackers Wear? Chapter 14: The Insider Threat Chapter 15: The Wireless Threat Chapter 16: The Dark Web

Part 3: Staying Safe

Chapter 17: Effective Security Achieved in Layers Chapter 18: Security is Everyone's Business Chapter 19: Take Control of Your Security

Part 4: Noteworthy Hacks and Breaches

Chapter 20: The Target Breach Chapter 21: And the Breaches Keep Coming (JP Morgan Chase Breach)

Chapter 22: iCloud Cyberhack: Nude Celebrity Photos Exposed Chapter 23: Sony Cyberbreaches Chapter 24: Office of Personnel Management: The Greatest Government Hack Ever

In Conclusion Glossary About the Author

FOREWORD

by Jon Leiberman

I FIRST MET SCOTT WHEN I INTERVIEWED HIM on my Sirius XM radio show, Leiberman Live. We talked about various security concerns and tools that addressed serious issues. We also discussed his new technology that could help teachers catch cheating students in the classroom. I was struck by his honest, easygoing manner and his ability to bring complicated concepts into easy-to-digest ideas. The audience found him compelling and--better yet--down to earth.

I was fascinated to hear of his personal story of being hacked by members of the black hat world who targeted him for revealing ways the Average Joe was being victimized.

Over the next few years, our paths continued to cross. My work as an investigative reporter often overlapped with Scott's. The criminal world was quickly embracing the countless ways that personal data was being shamelessly shared, bought, and sold. Scott was my go-to guy for simplifying the tech jargon for my audience. He got it, and he helped them get it, too.

Scott's book holds many first-hand accounts of stories with endings that can be hard to believe. He offers a clear foundation, yet provides a step-by-step guide through this often technically intimidating world. I read the book from cover to cover in one sitting, and immediately changed all my passwords to ones that were stronger. I suggest you do the same. And, I found out that's just the start of what we all need to do to safeguard our personal information.

Scott is a highly authentic source, an innovative business owner, and a sought-after speaker and security expert, and I hold his opinions in high regard. You will enjoy this easy-to-digest yet vitally important book.

Jon

Jon Leiberman's voice has been heard in countless households and vehicles across America. Literally millions of Americans recognize his voice for his work on the Howard Stern Show, America's Most Wanted, CNN, FOX, and more.

INTRODUCTION

WITH MY MONDAY-MORNING COFFEE IN HAND, I turned on my computer and began comparing my mental checklist to my digital one for all the items I wanted to accomplish that week. It was late in 2013, and this weekly ritual allowed me to feel a sense of accomplishment as I crossed off each item I completed throughout the day to help me stay focused in my little world of organized chaos.

I am the president and CEO of a privately held wireless engineering corporation that has been in business for more than forty years. Our area of expertise is in wireless and security testing tools. In the last five years, there has been rapid growth in wireless threat-detection tools used by cybersecurity groups globally. In a typical day at the office, I check our online accounts to see where we stand--especially to see if we received any incoming wire transfers, as about twenty-five percent of our business is international.

As I reflect back on that scary day now, I remember entering in my frustratingly long and easy-toforget password on the banking website only to find the account balance was alarmingly low. My mind raced in disbelief. Did payroll come out? No, wait, it's only Monday, and payroll is not debited until Thursday. I found myself looking at numerous debits not at all familiar to me. What's going on here? Then reality hit me.

"Hacked . . . again!" I finally had to admit it to myself out loud. We are a security company and this happened to us? But this was not an isolated incident or even the first time my company had been hacked. For that, we must look back even further to a slightly younger and greener small business and its owner. Between and after our hacks, I have come to learn so much more than I ever would've imagined. I try not to let my mistakes define me so much as guide me and keep me humble. And that brings me to this book and to the idea behind writing it. Hopefully, I will connect with readers eager to learn from my mistakes and my experience in the cybersecurity industry. I am excited to share my journey with you in the hope it will prevent you from going down same path I have already traversed. In Part 1, I share my candid story of how my small business was the victim of repeated cyberattacks and how I quickly learned that nothing is truly secure. In Part 2, I share best practices to help you protect your identity, business, personal data, and finances by using specific measures, both preventative and remedial. Part 3 is designed to help you stay safe in this challenging and always changing digital world without losing hope or sight of what's truly important. In Part 4, I tally the major breaches that have made the headlines over the past several years and how they affect us all. I can hardly contain my excitement for the world of technology that I live and work in everyday. I have carved a path for myself as a business owner, inventor, and now a cybersecurity expert, but I have much further to go, and this book serves as a next step in my quest to educate, inform, and, most importantly, help others survive and thrive in this digitally connected world.

PART 1

LEARNING THE HARD WAY

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download