As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company’s intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power grid can be manipulated or sabotaged by terrorists.

But knowledge is power. In this easy-to-read, fascinating and fully illustrated book, you learn how hackers make money, and what they target – along with concrete, hands-on hints for fighting back, whether you’re a concerned parent or a top executive.

With all the surrounding threats, what better person to prepare the public, than a team of internationally known cybersecurity experts? Nick Selby is a police detective specializing in sharing intelligence and busting cybercriminals. He knows how these crimes happen, who does them, and how to make your life safer. In The Cyber Attack Survival Manual he and a veritable brain trust of experts from the world of intelligence, digital currency, vehicle-hacking, and sophisticated crimeware, share the best techniques for everyone.

This indispensable, step-by-step guide to cyber defense includes:

Everyday security: How to keep your identity from being stolen, protect your kids, protect your cards and much more.

Big Stories: Silk Road, Ashley Madison, FBI vs. Apple, WikiLeaks, BitCoins, and what they mean to individuals and society at large.

Global issues: the NSA, how hackers can crash your car, and is China really planning to crash Google?

Crucial to surviving the worst the Internet can throw at you, The Cyber Attack Survival Manual is the must-have book of the 21st century. Think you don’t need this book because, “I have nothing to hide”? Selby and Vescent, along with Eric Olson, Moeed Siddiui, and John Bear, show you why you’re wrong (everyone now has something to hide) – and how lack of security can endanger your finances, your safety, and your reputation.


How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech
Based on the best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as
Daniel Miessler spends 5-20 hours a week consuming books, podcasts, and articles around the intersection of security, technology, and humans. Each episode—which is available as
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking,
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts--and a gripping inside look
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best "out of the box" user experience by providing the latest
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their
How China Took Over While America's Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,