The device(s) you use to access the eBook content must be authorized with an Adobe ID before you download the product otherwise it will fail to register correctly.
For further information see https://www.wildy.com/ebook-formats
Once the order is confirmed an automated e-mail will be sent to you to allow you to download the eBook.
All eBooks are supplied firm sale and cannot be returned. If you believe there is a fault with your eBook then contact us on ebooks@wildy.com and we will help in resolving the issue. This does not affect your statutory rights.
The Cybersecurity Landscape is for sure changing. For example, one of the oldest threat variants has been that of Phishing. It evolved in the early 1990s, but even today, it is still being used as a primary threat variant. But, it has become much more sophisticated, covert, and stealthy in nature. For example, now it can be used to launch Ransomware Attacks, Social Engineering, and Extortion like Attacks.
But the advent of Generative AI is making this much worse. For example, a Cyberattacker can now use something like ChatGPT to craft the content for Phishing Emails that are so convincing that it is almost to tell the difference of what is real and fake. This is also clearly evident in the use of Deepfakes, where real people are replicated into fake ones in order to create videos to lure the unsuspecting victims to a fake website.
But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book. In this, we cover the following: