- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
Phishing: Cutting the Identity Theft Line Paperback – May 6 2005
Special Offers and Product Promotions
To get the free app, enter your e-mail address or mobile phone number.
“…written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents…” (Computing, 28 July 2005)
From the Back Cover
Have you been caught yet?
They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions, and if you access the Internet, you're a target. Whether you manage corporate security or just shop online, this book is loaded with weapons you can't afford to be without.
- Be able to identify and avoid phishing emails and websites
- Recognize spyware, understand how it benefits phishers, and learn how to get rid of it
- Take appropriate steps to safeguard your organization against attack
- Learn how to protect yourself online
- Find out how to report phishing incidents, and why you should
- Understand the scope of phishing and how it threatens our online infrastructure
- Explore additional resources that will keep you up to date
- Discover how to get off the hook if you've already swallowed the bait
Inside This Book(Learn More)
Most Helpful Customer Reviews on Amazon.com (beta)
Chapter List: Phishing for Phun and Profit; Bait and Switch: Phishing Emails; False Fronts: Phishing Websites; Are You Owned: Understanding Phishing Spyware; Gloom and Doom: You Can't Stop Phishing Completely; Helping Your Organization Avoid Phishing; Fighting Back: How Your Organization Can Respond To Attack; Avoiding the Hook: Consumer Education; Help! I'm a Phish! Consumer Response; Glossary of Phishing-Related Terms; Useful Websites; Identity Theft Affidavit; Index
It used to be I'd see one or two "requests" a week to update my personal information for places like eBay or Citibank. Now it's closer to two or three a day. I'm well aware that these phishing attempts are scams meant to commit identity theft, but apparently we internet-savvy people are in the minority. Lininger and Vines have written a very readable and understandable guide to phishing that can easily be given to nearly anyone to help them protect themselves. The uninitiated will quickly grasp the idea that they shouldn't be responding to emails like these, and as a result they'll be much safer. People who are internet-savvy will learn the tricks that are used by the phishers to make links appear to be something other than what they truly are. Even organizations can benefit from the chapters on what they should do if they find that their servers have been co-opted to run a phishing scam.
Very practical material with the benefit of being a book that's fun to read. This is information that needs to be in the hands of all internet users these days...
I then stumbled across this book. It is very informative to those who are only vaguely familiar with this big scam. The authors even provide sample text and code that phishers have regularly used. As noted in the book, in the earlier days, the phishers often used poorly constructed English in their spam, but the scam has grown in its own sophistication. The authors provide also very clear terminology in regards to this scam, such as the difference between the terms: phish, vs. phishing vs. phishing sites vs. phishing email. They also provide help to those who have fallen for the phishing scams. The authors give the reader step by step instructions on how to go to the police to file a report and to report the issue to the ISP.
The authors are very correct, this problem of phishing is only going to grow larger as a problem online despite making more people aware of it and the unknown backend battle against it by the ISPs. Luckily magazines like Readers' Digest and Newsweek have had occasional articles on phishing. I can only hope spreading more of such awareness minimizes more attacks against unsuspecting users online who are defrauded.
I work in a field where I attempt to minimize phishing scams. I found that such attacks have seemed to increase over the past year. A good starter site for such information is: <a href="[...]">antiphishing.org</a> the Anti-Phishing Working Group's website. The phishers typically attack by compromising webservers with outdated OSes and/ or setting up fraudulent hosting accounts with stolen credit cards.
In my own forensic research from time to time with phishing scams on infected webservers, that often the culprits setting up the phishing sites are originating from IPs in foreign countries, notably North Africa and Eastern Europe. The only draw back to this book I can think of is I wish the book had more information pulled from ISPs themselves who fight this serious scam.
The authors have identified the key readership as "Incident Response Teams", "Information Security Professionals", "Executive Management", and "Everyone who uses the Internet". The technical detail and complexity is great for the first three categories of readership, but stating the book should be read by "everyone who uses the Internet" is, well, stretching it because that is virtually everyone on the planet with an Internet connection. People who go to [...], for example, will have a lot of difficulty following the book and knowing which bits are both relevant and simple enough to put into their daily lives. However, most people understand how a book is presented so long as they follow the Contents page and use it prescriptively; even the technically challenged will get something from it.
One last thing. I like the fact the authors have backed up what they talk about with references and follow on information. For example, when they talk about identity theft and how it impacts everyday people like you and me, they also provide details about what to do and where to go for help. It's one thing to ramble on about a problem; it is another to give guidance and support to those whose lives have been impacted by this social menace.
I could think of worse things to waste $30 on, frankly. I doubt you will regret buying it unless you want something simple and non-technical.
Phishing is essentially a detailed security awareness text focusing on phishing and identity theft. Its main aim is to enable the reader to identify and avoid phishing emails and websites, with secondary objectives being to raise awareness of spyware and other forms of malware, and to advise those who have already swallowed the phisher's bait.
The two chapters giving advice for financial services and similar companies whose customers are being phished are fairly weak, but to be fair there is not a huge amount they can do. Two chapters of advice for ordinary computer users go well beyond the usual `watch out for phishing emails', covering aspects such as antivirus and patching.
The following audiences are identified:
- Incident response teams at financial institutions
- Information security professionals and management
- Executive management of any company whose brand might be spoofed
- Everyone who uses the Internet
Phishing is quite a long and specific book that seems unlikely to be read by many non-technical readers, despite its laudable aims. The professional readership will benefit from this book.
Rachael Lininger is billed as a `technical writer in the information security department of a major US financial institution'. It is clear from her writing that she has written up a lot of phishing attacks before.
Russel Dean Vines is a well-qualified information security consultant and cyber-counterterrorism specialist as well as an accomplished jazz musician.
Although the topics are quite technical in places, the book treads a fine line between oversimplifying things and delving too deeply. Rachael's sections include some very welcome tongue-in-cheek asides and even the odd Monty Python reference to brighten up an otherwise rather dry topic. There are plenty of examples of phishing emails, analyzed down to the level of the HTML code, and URLs for more information.
Although things are moving rapidly in this field, Phishing remains relevant and useful two years or more after it was written. The authors' experience evidently qualified them to take a forward-looking perspective. This should definitely be on the bookshelf of the information security department at any eBusiness.