Member Reviews
Fascinating and some very useful information. A book for our times, certainly. To be recommended to many. keeping safe on internet is no easy task
There’s so many words you can use to describe this book - enlightening, scary, fascinating and even worrying! It was interesting to read how many ways people/companies can be taken advantage of some by very elaborate was, others by being fooled or equally by being daft!
I am the first to admit I don't know a huge amount about computers or how they can be used for hacking. When I saw this book I decided to give it a go and see if I could increase my knowledge so that I could understand more. I am aware of having strong passwords, not opening links in emails, if something is too good to be true then it is, and never giving details of PINs. As I said all very basic.
This book was ideal for me as it gave the information and the facts in a basic way. I wasn't left scratching my head and wondering what this was all about and feeling lost. The author gives the facts in a way that makes sense. So, yes, this is definitely aimed at the lower end of the tech-head ladder.
The author takes the reader through various things such as phishing, trojans, ransomware, worms, malware, cyber-attacks and a lot more. When she started to give numbers that were in the billions of dollars and how large companies could be held to ransom it was shocking.
From the very first bug to the latest attacks, the author explains the most significant ones and tells how criminals were able to get into systems. With the emergence of Bitcoin, this is a way of keeping things hidden.
The author has a great way of explaining her findings and the data citing various papers and articles all the way. This was an an eye-opener for sure and one that I also actually, really enjoyed reading.
If you have an interest in technology and how it can be misused and you don't really have a tech background or understanding then this is one you may find useful I certainly did. Interesting and quite addictive, one I would happily recommend.
Hacked is a great resource for those who do not come across cyber security in their day to day lives. I have worked in IT for many years so not much new for me. There are so many good human interest examples and the way Jessica explains everything is really straight forward which is fabulous for someone who isn't a techy. Even the vast amount of data she presents is non technical which is great. I'd have no problem recommending this book to my friends who aren't as tech savvy.
There was very little new to me in this book but then I've worked in IT for a looooong time and seen too many systems implemented where security was an afterthought.
The human interest stories used to illustrate how easily even aware people can be fooled were interesting and this should be compulsory reading for our "wonderful" political classes and civil servants , most of whom know far too little about the misery caused by all these scams and are still doing too little to hold the social media giants in particular, liable for permitting these scams to originate on their platforms.
The only real negative I found with this was as I was reading this on a kindle rather than a hardcopy book, the many notes at the end of each chapter were a nuisance. If it had been possible to link to these at the relevant point, it would have been far more useful and relevant. Digital books don't make it easy to flick to notes and back to the reading place.
So this isn’t something I would usually read but wow I love it. It was so insightful without being patronising and you could tell the author knew what they were talking about
A must read book
This book is packed with information about the many scams carried out by various electronic means including telephone as well. At first I thought this would depress me, but it did not as there is also much coverage of the ways such frauds are being compared and those responsible caught and punished. It is though an on going battle and is in the best interests of all of us,particularly when using the Internet.
Jessica Barker is renown in working to combat these scammers and manages to cram details of the many types of scams from the earliest ones right up to the present day. Each type is covered in great detail and there are comprehensive references for further reading at the end of each chapter.
Don't miss it or you may be caught out!
In this book I found lots of interesting information about cyber attacks and cybersecurity with tips and strategies to help you stay secure and keep your information safe.
Thank you to NetGalley and Kogan Page Ltd for my e-copy in exchange for an honest review.
This book is an excellent resource for anyone looking to delve into the world of cybersecurity and cyberattacks. It presents the information in an approachable manner, making it easy to understand even for beginners. Although the topic is not new, the author has done an excellent job of simplifying it, making it an informative and educational read.
The topic is highly relevant as cybercrime and identity theft continue to be on the rise, and is projected to only get worse.
However, I'm not sure whether a lengthy book on this topic is the best medium for raising awareness of it among the general populace, and the book is arguably not revealing "secrets" as the title suggests. There are already many videos on the likes of YouTube that show different types of online scamming attemts in action. Being able to present the faces and voices of real humans in those videos creates a very powerful and memorable effect, and makes it easier to educate more vulnerable members of the family in particular.
Perhaps the merits of this book is that the author explains terms very clearly and supports points with lots of statistics and research. That the book is rigorously filled with data and case examples therefore makes the book highly suited to students starting out in cybercrime studies or commercial fraud issues, while at the same time still being accessible enough for the average joe reader who just wants to understand a bit more about the fundamentals of cybercrime. To increase readership among the general public, it could have been an idea to have included a few diagrammatic visuals to illustrate/consolidate cybercrime pathways discussed in the book in order to facilitate grasping the "big picture" elements. Otherwise, I would struggle somewhat to identify a broader readership.
The book is essentially a formalized thorough introduction to a range of cybercrimes. Just don't read it before bedtime if you want to sleep soundly!