A startling new take on cybersecurity from one of the world's first digitally augmented humans In Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker, hacker, speaker, and cyborg (he has 10 microchips implanted in his body) Len Noe delivers a fascinating and incisive discussion of bio-implants and the cybersecurity attacks and defenses they enable. He explains phishing and social engineering techniques, tightening MDM restrictions, endpoint management, behavioral analytics, least privilege, privileged access, and other critical topics to show you how you can take…mehr
A startling new take on cybersecurity from one of the world's first digitally augmented humans In Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker, hacker, speaker, and cyborg (he has 10 microchips implanted in his body) Len Noe delivers a fascinating and incisive discussion of bio-implants and the cybersecurity attacks and defenses they enable. He explains phishing and social engineering techniques, tightening MDM restrictions, endpoint management, behavioral analytics, least privilege, privileged access, and other critical topics to show you how you can take preventive measures to protect against the threats you can't see. Human Hacked describes the history of transhumanism, the types of bio-implants currently available on the market, and how the latest technologies can allow for access to even the most technology restricted areas. It also explores legal protections for augmented humans, as well as the companies and enterprises that employ them. An engrossing, can't-miss read for private-sector and government security professionals everywhere, Human Hacked is also an essential resource for anyone with an interest in the intersection of biology, technology, and cybersecurity. You won't find any other book like it.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
LEN NOE is a technical evangelist, white hat hacker, and biohacker for CyberArk Software. He's an international cybersecurity speaker with 10 digital devices implanted in his body. As a global thought leader in the Transhuman/Human+ movement, he uses his microchip implants to advance cybersecurity and the human experience.
Inhaltsangabe
Foreword xiii Introduction xix 1 The Human Years 1 The Odyssey 2 2 The Commodore 64 4 Newb Before It Was a Thing 5 Windows into the Corporate World 7 A Hacker Is Born 8 A Life Divided 9 Flesh Is Stronger Than Steel 10 2 A Change in Direction 15 Into the Light 17 Road Warrior 17 3 Symbiotic Attack Vector 21 Tap-to-Pwn 22 My First Attack: Dinner and a Show 28 4 Transhumanism: We Who Are Not As Others 31 A Brief History of Transhumanism 33 I, Cyborg 38 Bad Intentions 39 Notes 42 5 Using Their Laws Against Them 43 Prepare for Takeoff Seat Backs and Tray Tables 45 Obfuscation by Law 47 6 A Technological Rebirth 51 Finding My Techno-shaman 55 Honey, We Need to Talk 58 7 My First Installs 61 Human MFA 63 Touching Digital 65 Cyberpunk in Downtown Austin 66 I Am Machine 71 Physical Meets Biological 72 Digital Lockpicks 73 Magnetic Vision 75 My Tools 78 Note 80 8 I Am the Cyber Threat 81 Mobile Devices 81 L3pr@cy Attack 81 Fl3$h-H00k Attack 82 Implant a Man-in-the-Middle Attack 84 Implant Phishing/Smishing Attack 95 Implant Automation Attack 99 Physical Access 100 H@nd-$h@k 3 102 Magnetic Tracing 104 Notes 107 9 Living the Transhuman Life 109 VivoKey Chips 109 VivoKey Spark 2 109 VivoKey Apex 111 Cheeseburger Use Cases 112 Walletmor 115 NeXT Chip and BioMagnet 116 10 I'm Hackable 119 Identity Evolution 120 Cultural Significance 121 What Is "Acceptable"? 123 Am I an Abomination? 124 Note 126 11 Here There Be Grinders 127 The PirateBox and PegLeg 127 The HakLeg 129 HakLeg Antenna 130 A Grinder After All 131 Why Me? 131 Note 132 12 Current Limitations of Transhuman Technology 133 Cyber Defense Against Humans 135 Technological Identification and Mitigation 136 Phishing Attack Defense 138 Smishing Attack Defense 139 MitM Defense 139 Technological Work-Life Balance 141 Physical Access Attacks 141 Specialized K9 Detection 143 Notes 145 13 The Future of Transhuman Technology 147 Brain-Computer Interfaces 148 Invasive BCIs 148 Early Issues in the Neuralink BCI 149 Neuro Rights 150 Partially Invasive BCIs 151 Noninvasive BCIs 152 Smart Devices 153 Internal Power 154 Sound Power 155 Glucose-Powered Metabolic Fuel Cell 155 Kinetic Power 156 Thermal Power 156 Batteries 157 AI: A Necessary Evil 158 Military Defense/Espionage 159 Haptics 161 Notes 162 14 Transhuman Rights Are Human Rights 165 Transhuman Discrimination 168 The Hypocritic Oath 172 Transhuman, but Still Human 173 Notes 175 15 My Future as a Transhuman 177 Final Thoughts 180 Notes 182 A My Hardware 183 NExT 183 VivoKey Spark 2 (Cryptobionic) 183 flexNExT 184 flexM1 "Magic" 1k 185 flexEM T 5577 186 Titan-Sensing Biomagnet 186 Walletmor 187 flexDF2 DESFire 188 VivoKey Apex 188 flexClass (HID iClass) 189 B FAQs 191 C Resources 195 My Body Mechanics 195 Organizations, Clubs, and Information Hubs 195 Implant Distributors 197 GitHub Repos 197 Open-Source Tools 197 Acknowledgments 199 About the Author 201 Index 203
Foreword xiii Introduction xix 1 The Human Years 1 The Odyssey 2 2 The Commodore 64 4 Newb Before It Was a Thing 5 Windows into the Corporate World 7 A Hacker Is Born 8 A Life Divided 9 Flesh Is Stronger Than Steel 10 2 A Change in Direction 15 Into the Light 17 Road Warrior 17 3 Symbiotic Attack Vector 21 Tap-to-Pwn 22 My First Attack: Dinner and a Show 28 4 Transhumanism: We Who Are Not As Others 31 A Brief History of Transhumanism 33 I, Cyborg 38 Bad Intentions 39 Notes 42 5 Using Their Laws Against Them 43 Prepare for Takeoff Seat Backs and Tray Tables 45 Obfuscation by Law 47 6 A Technological Rebirth 51 Finding My Techno-shaman 55 Honey, We Need to Talk 58 7 My First Installs 61 Human MFA 63 Touching Digital 65 Cyberpunk in Downtown Austin 66 I Am Machine 71 Physical Meets Biological 72 Digital Lockpicks 73 Magnetic Vision 75 My Tools 78 Note 80 8 I Am the Cyber Threat 81 Mobile Devices 81 L3pr@cy Attack 81 Fl3$h-H00k Attack 82 Implant a Man-in-the-Middle Attack 84 Implant Phishing/Smishing Attack 95 Implant Automation Attack 99 Physical Access 100 H@nd-$h@k 3 102 Magnetic Tracing 104 Notes 107 9 Living the Transhuman Life 109 VivoKey Chips 109 VivoKey Spark 2 109 VivoKey Apex 111 Cheeseburger Use Cases 112 Walletmor 115 NeXT Chip and BioMagnet 116 10 I'm Hackable 119 Identity Evolution 120 Cultural Significance 121 What Is "Acceptable"? 123 Am I an Abomination? 124 Note 126 11 Here There Be Grinders 127 The PirateBox and PegLeg 127 The HakLeg 129 HakLeg Antenna 130 A Grinder After All 131 Why Me? 131 Note 132 12 Current Limitations of Transhuman Technology 133 Cyber Defense Against Humans 135 Technological Identification and Mitigation 136 Phishing Attack Defense 138 Smishing Attack Defense 139 MitM Defense 139 Technological Work-Life Balance 141 Physical Access Attacks 141 Specialized K9 Detection 143 Notes 145 13 The Future of Transhuman Technology 147 Brain-Computer Interfaces 148 Invasive BCIs 148 Early Issues in the Neuralink BCI 149 Neuro Rights 150 Partially Invasive BCIs 151 Noninvasive BCIs 152 Smart Devices 153 Internal Power 154 Sound Power 155 Glucose-Powered Metabolic Fuel Cell 155 Kinetic Power 156 Thermal Power 156 Batteries 157 AI: A Necessary Evil 158 Military Defense/Espionage 159 Haptics 161 Notes 162 14 Transhuman Rights Are Human Rights 165 Transhuman Discrimination 168 The Hypocritic Oath 172 Transhuman, but Still Human 173 Notes 175 15 My Future as a Transhuman 177 Final Thoughts 180 Notes 182 A My Hardware 183 NExT 183 VivoKey Spark 2 (Cryptobionic) 183 flexNExT 184 flexM1 "Magic" 1k 185 flexEM T 5577 186 Titan-Sensing Biomagnet 186 Walletmor 187 flexDF2 DESFire 188 VivoKey Apex 188 flexClass (HID iClass) 189 B FAQs 191 C Resources 195 My Body Mechanics 195 Organizations, Clubs, and Information Hubs 195 Implant Distributors 197 GitHub Repos 197 Open-Source Tools 197 Acknowledgments 199 About the Author 201 Index 203
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497