As online privacy and security continue to be hot topics, a wide range of high-quality books are being written on the subject. If you have any interest in this topic, never be short of reading material as experts in these fields express their opinions and tell stories on a wide range of related topics.
I've scoured the hidden depths of my Kindle Kindle Kindle Giving you trouble? Three Easy Solutions and Troubleshooting Steps Is Kindle Giving You Trouble? Three Easy Solutions and Troubleshooting Steps Amazon's Kindle range of e-readers are great, lightweight devices that let you take your library of books with you wherever you go, but what happens when a Kindle goes wrong? Read More
I mentioned earlier Dragnet Nation in my article on breaking free from Google's grasp How to delete your data from Google and try to recover some of your privacy How to delete your data from Google and try to recover some of your privacy Removing all traces of you from the web is not easy, but after after reading Julia Angwin's Dragnet Nation you might want to give it a try. It's time to stop willingly throwing away your privacy. Read more . This is an immensely readable book, detailing Angwin's attempts to win back her privacy. She does this by contacting hundreds of data brokers, requesting the information they have on her and demanding that it be removed..
It also tries to encrypt her email. The 3 Most Secure and Encrypted Email Providers Online The 3 Most Secure and Encrypted Email Providers Online Fed up with government surveillance? Are you worried that your emails may be read by third parties? If so, it's worth looking into an encrypted email solution to protect your messages. Read more, delete your Google search history How do I delete previous Google searches? How do I delete previous Google searches? Read more, keep your credit cards in an RFID wallet What are RFID blocking wallets? (And what should you buy?) What are RFID blocking wallets? (And what should you buy?) If you have cards, passports, or devices with RFID chips, then an RFID-blocking wallet could be important to keeping your data safe. Read More Top 8+ Security and Privacy Extensions for Chrome Browser. Top 8+ Security and Privacy Extensions for Chrome Browser. Google's Chrome Web Store hosts many extensions that can protect your security and privacy while using Chrome. Whether you want to block JavaScript, plugins, cookies, and tracking scripts, or force websites to encrypt your traffic,… Read More She manages to blend in, all of which she discusses in the book..
Angwin also reveals that she applied for a credit card under a different name and was given a new identity. 4 Good Ways to Dress Up Online 4 Good Ways to Dress Up Online Why would you need to dress up online? Isn't this kind of behavior just for hackers, spies, and short-lived people? Well not exactly. It's not always easy to completely disguise herself in a... Read More It's exciting, and you'll definitely read it to the end.
In Data and Goliath , Bruce Schneier, Security Expert Bruce Schneier on Passwords, Privacy, and Trust Bruce Schneier, Security Expert on Passwords, Privacy, and Trust Learn more about security and privacy in our interview with security expert Bruce Schneier. Read More It tries to show us who is doing what to us and how they are using our information. In doing so, he beautifully explains why privacy is (or at least should be) an essential human right for every person..
She tells us what our mobile phone is doing to us while it is on. He reveals what happens when you buy something online and what it reveals about us. Do you do a lot of email? That can also erode your privacy. Then there is the almighty Google that knows everything about us. But how and why? Schneier doesn't leave Facebook off the hook either. What Information They Collect About You Facebook Privacy:25 Things The Social Network Knows About You Facebook Privacy:25 Things The Social Network Knows About You Facebook knows a surprising amount about us — information we volunteer. From that information, you can locate yourself in a demographic group, record your likes, and monitor relationships. Here are 25 things Facebook knows about... Read More
Governments and corporations have turned the world into one big big brother society. 10 unique live webcam feeds to watch the world 10 unique live webcam feeds to watch the world. in some fascinating places around the world, they can make your jaw drop. Real-time webcams capturing unique events... Read More But why do we tolerate these brazen intrusions into our lives? Schneier explains it all, offers a solution to the problem, as well as tips on how to protect yourself.
Digital Hit Man is a book by Frank M. Ahearn, who specializes in missing persons. Previously, he was at the other end of the spectrum:employed as a jump tracer and hired by the rich and famous, as well as the newspaper newspapers, to find people who didn't want to be found..
He used a technique called “social engineering” How to Protect Against Social Engineering Attacks How to Protect Against Social Engineering Attacks Last week we looked at some of the top social engineering threats that you, your company, or your employees should be aware of. In a nutshell, social engineering is similar to a… Read More ” to obtain sensitive records, allowing you to hunt down your prey. Later, he started his own witness protection program and helped the victims of stalkers..
He now he has flipped the coin to become an expert on how to disappear. In his book, he shows you how to create and use deception to combat sites that violate your privacy online by revealing information that is making your life hell. As a master of deception and misdirection, Ahearn will show you how you can get that embarrassing information off the Internet.
Joseph Menn covers cybersecurity stories for the Financial Times 8 websites to help you plan for his financial future. 8 websites to help you plan for his financial future. Personal financial planning is a vital aspect of modern life, and you need to understand it. These websites will help you improve your bank balance or eliminate your overdraft. Read More they are numerous. The book tells the story of a computer expert named Barrett Lyon, who decided to investigate hackers on business websites. Unbeknownst to him, the Russian mob was behind these attacks. They were stealing from corporations, stealing financial consumer data, and stealing government defense secrets.
This was in 2004, and at this time, US law enforcement was still not up to speed on these issues. Not so the UK. The London-based National High-Tech Crime Unit sent agents to request Barrett's help. They also sent a detective to Russia to find and take down the hackers.
Fatal system error offers unprecedented access to both mafia companies and Russian officials. It illustrates how major criminals gained the protection of the Russian government and the dangers facing the Internet today.
First I read Cornerstone Several years ago, and took a long trip back with my wife. Instead of visiting relatives and seeing the sights, I was hooked on this book. I like Dragnet Nation It's a very easy read:Poulsen (who is the senior editor of Wired magazine) has a knack for telling a story well.
The book concerns a black hat hacker named Max “Ice Delivery Man” Butler, who in addition to being a celebrity and consultant to the FBI (Federal Bureau of Investigation), also secretly ran a multi-million dollar online crime ring. When word gets out that someone has just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy, the FBI scrambles to investigate.
Little did they know that the person they were looking for was none other than Butler. But despite covert ops, moles, and double agents, Butler managed to stay ten steps ahead of the authorities. While he was doing it, he was also stealing millions of credit card numbers and stealing money from other hackers.
This book covers the efforts of law enforcement to catch Butler, and the effects that online criminal enterprises like this have on ordinary law-abiding people.
Finally, a topic everyone can relate to:spam. No, I'm not talking about canned meat, I'm talking about the annoying emails you get every day What everyone should know about dealing with spam What everyone should know about dealing with email It might be nearly impossible to stop spam altogether, but it's certainly possible to reduce its flow to a trickle. We tell you about some of the different measures you can take. Read More offers you a fantastically better sex life and cheaper drugs from Canada. Or maybe it's the Nigerian princes offering you Nigerian scam emails hiding a terrible secret? [Opinion] Are Nigerian Scam Emails Hiding a Terrible Secret? [Opinion] Another day, another spam drops into my inbox, somehow making its way into the Windows Live spam filter which does a good job of shielding my eyes from all the other unsolicited.. Read More Yes, that kind of spam. The insidious kind..
In Spam Nation , Krebs takes us inside the criminal networks that run the spam empires and the banks where they keep their money. He talks to computer programmers and mobsters to find out how the business works, which also includes collecting personal data and selling it on the black market..
All of which makes this a fascinating read for anyone who has received spam in their inbox. Surely everyone is reading this..
Have you read any of these books, if so, what are your opinions on them? Can you recommend similar books on online privacy and security that other MakeUseOf readers should check out? Please let us know your thoughts in the comments section below.