Abstract
Our professional intersection with—and investment in—the material we try to condense and describe in this book goes much deeper than our somewhat removed role as authors. We do hope that here we’ve been able to offer an easily digestible, essentially linear (entertaining?) framework for both understanding and, even more important, contending with emergent and constantly evolving threats to end users’ data security. Broad consumption of even some of the cautions we offer, by sophisticated non-techies trying to function in an environment where the rules of play—and even the game itself—are constantly in flux, has potential to stem some of the truly mind-boggling data and security losses we’ve all read about and unfortunately even experienced first-hand.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
ZD Net, Charlie Osborne, “FBI Investigates Hack of JPMorgan, Other US Banks,” www.zdnet.com/fbi-investigates-hack-of-jpmorgan-other-us-banks-7000033080/, August 28, 2014.
- 2.
Techworld, Roger A. Grimes, “11 Sure Signs You’ve Been Hacked,” http://news.techworld.com/security/3500234/11-sure-signs-youve-been-hacked, February 3, 2014.
- 3.
Wired, Andy Greenberg, “ These 3-D Printed Skeleton Keys Can Pick High-Security Locks in Seconds,” www.wired.com/2014/08/3d-printed-bump-keys/?mbid=social_fb, August 26, 2014
- 4.
PCWorld, Ian Paul, “Yahoo Mail to Support End-to-End PGP Encryption by 2015,” www.pcworld.com/article/2462852/yahoo-mail-to-support-end-to-end-pgp-encryption-by-2015.html, August 8, 2014
- 5.
Ars Technica, Jon Brodkin, “Dropbox Matches Google and Microsoft Pricing for a Terabyte,” http://arstechnica.com/information-technology/2014/08/dropbox-matches-google-and-microsoft-pricing-for-a-terabyte/, August 27, 2014.
- 6.
Wired, Andy Greenberg, “This Android Shield Could Encrypt Apps So Invisibly You Forget It’s There,” www.wired.com/2014/08/m-aegis-android-encryption/?mbid=social_fb, August 19, 2014.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Daniel G. Bachrach
About this chapter
Cite this chapter
Bachrach, D.G., Rzeszut, E.J. (2014). Conclusion. In: 10 Don’ts on Your Digital Devices. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-0367-5_11
Download citation
DOI: https://doi.org/10.1007/978-1-4842-0367-5_11
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-0368-2
Online ISBN: 978-1-4842-0367-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)