You will get hacked!
In How Hacks Happen and how to protect yourself, you learn how hackers think, work, and exploit. The author presents fake web pages, shares where your passwords spread and explains how social media sites monetize personal information. How Hacks Happen is for anybody who feels technology is “too much to handle.” Let somebody else become the victim. You read How Hacks Happen.
Buy Digital (PDF) Workbook ($19.95)This hack happens every day
You go to work. You arrive late, of course, because traffic moved slower than it should. You’re frantic. You barely pay attention as you sit down at your desk and open your email. You see one that warns your Gmail password will expire within 24 hours. ‘“Click here” to reset the password and acquire your email within 24 hours or your account will be exterminated’ it says. You click. Never mind that you have not had your morning coffee yet and you’re still fuming about the slow commute.
“Email is my lifeblood,” you mutter. “I better renew my account now because I cannot lose access.” You type your email address, daphneprancer@gmail.com and click Next. The trick is on you. It only looks like Gmail…
Buy Digital Workbook ($19.95)Table of Contents
- White Hats and Black Hats
- Email Hack
- You are Pwned
- Passwords
- Multi Factor Authentication
- Convenience vs. Security
- Attractive Targets
- How I Hack
- Hacking WordPress
- Surrender Media (Social Media)
- Fake Social Media Connections
- Facebook, Google and Yahoo Track
- How to Protect Yourself
A Workbook (because life is not a spectator sport)
Passwords
Learn how hackers trick you into disclosing passwords, and how stolen passwords are available on the dark web. Stealing passwords, credit card numbers and social security numbers is not a crime, according to some hackers. Learn why...
Learn how Facebook and other social media services record and use personal information you surrender (share). Too much sharing jeopardizes your identity, your physical security and your career. Learn why...
Solutions
Learn how to protect yourself, your secrets and your reputation. This may be a bitter pill to swallow, but we're talking about protecting you and your money from highly motivated hackers. An ounce of prevention is worth a pound of cure. Learn how...
Some people you may meet on social media
Cassandra
Single mom. Receptionist for a federal government agency's Los Angeles office. Helps establish neighborhood watches throughout Los Angeles County. Tells her kids and neighbors you have to be street smart when you live in the big city.
Too bad this picture and persona are not real. Read How Hacks Happen to learn how someone would create this fake persona to exploit you.
Next time you peruse friend requests, ask how you know that persona is a genuine person, and not a hacker's tool.
Tom
Single. Medical student. Works part time at a coffee shop in Palo Alto. Plays computer games in his precious free time. Promises to cure dementia, which has stricken his grandmother. Tells friends the country will be screwed up until we elect Bernie Sanders President and he cancels student loan debt.
Too bad this picture and persona are not real. Read How Hacks Happen to learn how someone would create this fake persona to exploit you.
Next time you peruse friend requests, ask how you know that persona is a genuine person, and not a hacker's tool.
Lynne
Happily married to a professional athlete. Real estate agent in San Francisco. Runs three marathons a year. Promised her mom she would visit all seven continents before turning 50. Laughs and walks away when you try talking politics.
Too bad this picture and persona are not real. Read How Hacks Happen to learn how someone would create this fake persona to exploit you.
Next time you peruse friend requests, ask how you know that persona is a genuine person, and not a hacker's tool.