- Format: Kindle Edition
- File Size: 6583 KB
- Print Length: 207 pages
- Page Numbers Source ISBN: 0996902201
- Publisher: ScottSchober.com Publishing (1 March 2016)
- Sold by: Amazon Australia Services, Inc.
- Language: English
- ASIN: B01CFCHAHG
- Text-to-Speech: Enabled
- Word Wise: Not Enabled
- Customer Reviews: 18 customer ratings
- Amazon Bestsellers Rank: #704,604 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
Hacked Again Kindle Edition
Customers also viewed these products
''How can the little guys anticipate and prepare for a potential hack? For starters, they should read Schober's book--which he could have just as easily named 'The Original Hacker's Dictionary For Small Business Owners'.''--Forbes Magazine
''Cybersecurity Bible for small business owners.'' --Steve Morgan of Cybersecurity Business Report
''Hacked Again is a well written book that I recommend without hesitation--especially as a primer for business owners or even government business pros who want to understand what really happens before, during and after data breaches or security incidents that occur regarding your own accounts.'' --Dan Lohrmann, Government Technology
''I will be incorporating Hacked Again into my cybersecurity courses. There is no other book that lays this great of a cybersecurity foundation, and also details recent hacks of major corporations.''--Professor Jonathan S. Weissman, RIT/FLCC/Nazareth College
''…buy them a copy of the book, write an inscription in the cover, and ten days later ask them what they have learned.'' --Stephen Northcutt, SANS Technology Institute
''Now I understand the urgency of strong passwords! I will recommend your book to my friends, it was a good read.'' --Mike Case, Globalstar Director, Gateway Engineering --Reviews
''Scott Schober's small business got hacked, and hacked again. The harrowing experience led him to write a book -- Hacked Again, which could just as easily have been called the Cybersecurity Bible for small business owners.
''Schober starts out by explaining the exact details of how his corporate checking account got hacked -- which led him to switch banks, only to have his new checking account hacked. He helps cyber novices to understand what a hack is, how to recover from it, and the cybercriminal mentality which motivates the hacks.
''Although the book tells a story -- it is broken down into chapters that cover one aspect of cybersecurity after the next, which are specific to small businesses. The first thing readers learn about is the hacker's practice of social engineering, the shady art of manipulating others into sharing their personal identities, credit card digits, and other information (or stealing that same information).'' --Steve Morgan, CSO Magazine
''A self-help guide to understanding cybersecurity jargon recently hit the shelves.
''Scott Schober, a New Jersey small businessman, suffered two online robberies committed by cyber thieves -- and now he is fighting back... with a book titled 'Hacked Again'. Schober -- who has become somewhat of a cybersecurity celebrity -- is arming other small business owners with the knowledge to fight back in the growing war against hackers.
''Cybercrime costs are projected to reach $2 trillion by 2019, quadruple the costs suffered by businesses affected by digital break-ins and thefts in 2015. Large corporations and government agencies are not the only targets. According to Microsoft MSFT +0.48%, 20% of small to mid sized businesses have been cyber crime targets. Small businesses may face the greatest risks because they don't have full-time staff dedicated to protecting against cyber attacks, and dealing with the post-attack disruptions.
''How can the little guys anticipate and prepare for a potential hack? For starters, they should read Schober's book -- which he could have just as easily named 'The Original Hacker's Dictionary For Small Business Owners'.
'''Hacked Again' is less about Schober's firm getting hacked repeatedly, and more about informing readers on topics including: What is a hacker?; What motivates hackers?; Where do hackers hang out (online)?; and how can hackers be detected of lurking around websites where they don't belong?'' --Steve Morgan, Forbes Magazine
About the Author
Scott N. Schober is a wireless technology & cybersecurity expert and the President and CEO of Berkeley Varitronics Systems (BVS), a forth-year-old provider of advanced wireless RF test and security solutions. Scott has overseen the development numerous cell phone detection tools used to enforce a ''no cell phone policy'' in correctional, law enforcement, and secured government facilities.
Scott regularly appears on Bloomberg TV as a cyber security expert, with numerous appearances on ABC, Al Jazeera America, CBS This Morning News, CCTV America, CNBC, CNN, Fox Business, Fox News, Good Morning America, Inside Edition, and MSNBC. Scott's voice is heard on dozens of radio stations such as XM Sirius Radio, Bloomberg Radio, and The Peggy Smedley Show. He has presented as a subject expert discussing cybersecurity/corporate espionage at numerous conferences around the globe. Scott has been interviewed in WSJ, Forbes, Fortune, Success, NY Daily News, Newsweek, USA Today, and The New York Times.
Customers who bought this item also bought
|5 star 81% (81%)||81%|
|4 star 0% (0%)||0%|
|3 star 0% (0%)||0%|
|2 star 19% (19%)||19%|
|1 star 0% (0%)||0%|
Review this product
Top international reviews
There is some bad advice as well, mixed in with the good stuff. For example, he seems to think a Wifi password is something precious and if a hacker cracks that it's game over. It actually shouldn't make much difference because you shouldn't be sending passwords or other confidential information unencrypted in the first place, nor relying on a NAT router to isolate your computer from the outside world. He doesn't discuss those more important issues much at all.
His advice on passwords is out of date and sometimes contradictory as well. For example, he changes passwords regularly which is no longer regarded as best practice, is likely to do more harm than good and misses the point that using strong unique passwords everywhere would make this pointless. He says without evidence that 15-character passwords are necessary and would take "billions of years" to crack, neither of which are really true.
He discusses methods of making memorable passwords when it would be better (in my opinion) to concentrate on using a password manager because anything memorable is likely to be non-unique (and also weaker in general than something random). He does discuss password managers and rightly points out the problems with services like lastpass that have been repeatedly hacked, and the insecurity of allowing browsers to autocomplete forms. But he doesn't go on to discuss more secure options like KeePass.
I would have liked to see better discussion of backup options, recognising that the biggest risk to your data is not from hackers but from human error (such as accidental deletion or reformatting).
I would also have liked more discussion about the problems of physical access to a computer making hacking much easier. People often don't realise how easy it is to reset the admin password on a computer as long as you can boot it from a DVD or USB drive for example, and I think his target audience would have found that information valuable. In practice this means that portable devices should really always be encrypted in case they are lost and a thief ends up with access to your email and can then use that to reset passwords on accounts where you may have saved credit card details.
So overall I was disappointed - I thought this book was more about what Bruce Schneier calls "security theatre" than serious analysis.
In February 2017, I saw ‘Hacked Again’ by Scott Schober advertised on Amazon, took a punt and purchased the book. Question - Is this a publication which should sit on every Security Professionals shelf? I think not. However, more to the point – is this a book which should sit on the shelves of every ordinary user who utilises the Internet to conduct on-line banking, commercial transitions, or who use Social Media? Here my answer is a resounding YES.
The beauty of this book is, out of real-world encounters with cyber-insecurity, Scott has crafted and translated the common cyber-risks we all face on an everyday basis, into simple language which even the most uninformed reader can understand, and In an age in which cybercrime is rife, and the associated losses are expected to reach around $2 Trillion by 2019, I can’t recommend this book enough to every user of the internet to serve as the best cyber-security bible and educational read they will ever access.'
Prof John Walker
Il libro non da niente alle persone che sanno anche solo il minimo su argomento. Potrebbe servire solo alle persone che non hanno mai sentito del hacking e chi pensa che Internet = Internet Explorer.
Soldi buttati per tutti gli altri.
People love stories, and business owners need to know more than just facts - they need to hear real-life accounts. Such an account is given in Hacked Again. Simply giving facts can lead to an increased anxiety when those facts are not tied to one’s experience. Hacked Again starts with a business owner’s account of living through and with being hacked (including his thoughts, feelings, and actions) - multiple times.
It proceeds with important overviews of important security topics (e.g., passwords, phishing, insider threat), and ends with details and lessons from some of the larger breaches (at least form the time it was published). There are plenty of breaches to discuss, but choosing the right ones with pertinent lessons is vital. Scott does that here.
Scott goes into what I consider just enough detail of the topics to keep a non-tech business leader interested but not embroiled (there’s a fine line between appealing information and pedantry).
I learned from a musician several years ago that “A clean show never offends anyone.” Scott has attained that here. I have no issue letting our kids read this (while there’s a quote from a customer who says “he**,” it's easily handled by an audience able to handle the business content of this book).
I approached it with the stated audience in mind - business owners. As I progressed through it, I kept slipping into the desire to have more specifics and technical details (e.g., on two-factor authentication), but I had to bring myself back to the intended audience. Given that the intended audience is people who need to know about the topic, but not necessarily the specifics, the topics are covered in enough detail to provide the requisite knowledge for an owner or leader to make an informed decision. It’s been said that “Without education, we are in a horrible and deadly danger of taking educated people seriously.” Business owners need to be aware enough of what’s going on to be able to make proper decisions as to products and services for their companies.
The topic of cybersecurity can be mystifying, with all of the lingo and jargon thrown around, and the drastic pace and rapid proliferation of articles on “do these 10 things now!” can make for a discouraging learning curve. Business owners have enough trouble with their day-to-day operations, without having to learn a new language and invest all kinds of time and money in iffy new products/services. When the frequent solution to a security problem is a product or service, Scott offers the real gateway to the solutions - education.
I appreciate that the language is not dumbed down. It’s approachable. That approachability makes it a quick and entertaining read (I think - though I my work is infosec, so I already understand the terms). And the layout of the chapters makes it possible to read a chapter at one sitting, and still learn something without depending on the next or previous chapter.
I just recently gave a talk on cybersecurity to business owners, and received several requests for help in educating their employees on cybersecurity. This book will be one of the resources I will highly recommend.
I have my college students read the book. Unilaterally, they provide positive and energetic feedback. It's a great window into the world of cybercrime and information security.
I can't recommend it enough!
It’s true, many of us want to believe that becoming the victim of a data breach, cyber attack, or identity theft won’t happen to us, but as Scott Schober illustrates, that is a VERY dangerous place to be. While everyone is a target, we can reduce our risk to becoming a victim by applying lessons learned from people/businesses like Scott Schober and BVS who are authentic and transparent about being the victim of not one, but multiple cyber attacks. Scott, unlike most, possessed the knowledge and experience to protect himself, but still ended up learning the hard way. Because of his expertise, Scott knew what to do and where to start. If you aren’t a cyber security expert, and you are reading this, well done, and thank you! You are much farther ahead than most.
Hacked Again is thoughtfully organized, well written, and provides a concise overview of the common threats that we all face every day. There is always more to learn, but Scott does an exceptional job of providing the highlights of every day cyber threats. He also mentions a few advanced, highly targeted, atypical threats, like Stuxnet, Sony, and OPM. But the one thing that almost every cyber attack has in common, a “single act of human weakness.” The greatest technology in the world will not stop someone from revealing their password or other valuable information. Security is only as strong as your weakest link. This is the foundation of my mission, to educate the why and how cyber attackers have turned their focus from hacking systems to hacking people, and to encourage and equip businesses to invest in education to reduce the risk posed from social engineering and insider threats (intentional or unintentional).
If NOTHING else, Scott’s "Quick Tips” could be used as a checklist for the overwhelmed business owner or consumer on where to start to begin improving cyber hygiene. The Quick Tips also provide a bite of educational material to share with staff.
Regarding Target and Fazio Mechanical Services. Being from Pittsburgh, I tell this story almost every day. It’s usually in the interest of, it does happen here, knowing your vendors, and do you want to be a reason that a major corporation loses millions, or billions of records?
I felt BEWARE OF THE “WARES” could have been delineated a little better by malware type, and maybe included a little more information on other types. The section was dominated with ransomware - understandably so, but it made the section seem forced. Side note: Also mentioned in this section is Brian Krebs - I’ve been a fan of Brian Krebs my entire cyber security career.
This is a must have for any cyber security evangelist to have on hand to pass out during his/her elevator speeches. I purchased 5 copies. So far I have used them as giveaways at presentations and networking meeting drawings. I will be purchasing a few more to actually give to potential clients, and more giveaways, etc...
Full disclosure - I was offered a complimentary e-version of this book for an honest review; however, I chose to purchase an e-copy and still write an honest review. In addition, I have purposely not read more than 1 review so my comments would not be clouded, and hopefully serve to reinforce what others have said. The only review I read was from a SANS reviewer, and I responded to their challenge to purchase multiple copies and provide to potential clients. My comments are my own, based on industry experience.
Background - I have a 15+ year technical background, including 10+ years in cyber security. 1 year ago today, I left the corp world (a major global financial institution) to pursue helping small businesses (primarily small healthcare practices) with cyber security (disguised as HIPAA Compliance)
compliance != secure, but it’s a good place to start 😉