Click each image to download the larger version.
- hardcover book
- CIEB puzzle
- Book Cover Artwork
- Scott N. Schober – Author, CEO & Cybersecurity Expert
- Scott N. Schober, CEO of Berkeley Varitronics Systems, Inc.
- Chapter 1 – The “Cyber” in Cybersecurity
- Chapter 2 – Spies Like OS
- Chapter 3 – Engineered for Social
- Chapter 4 – Minding the Hack
- Chapter 5 – You’re in Good Hands with Cyber Insurance
- Chapter 6 – Do Not Read This Chapter until You’ve Done Just One Small Thing
- Chapter 7 – Virtual Peace of Mind
- Chapter 8 – Minimize Your Digital Footprints
- Chapter 9 – Digital Spring Cleaning
- Chapter 10 – Robocalls Have Gone Viral
- Chapter 11 – Ashley Madison Is Cheating the Cheaters
- Chapter 12 – Yahoo Has Been Hacked Again and Again
- Chapter 13 – Massive Breach Befitting a Massive Hotel Chain
- Chapter 14 – Opening a Can of Cyber Worms
- Chapter 15 – The Internet of Stings
- Chapter 16 – Equifax and What Not to Do When You Are Hacked
- Chapter 17 – Uber’s Bumpy Ride
- Chapter 18 – Anthem’s Unhealthy Breach
- Chapter 19 – The Battle over Our Data Has Just Begun
- Chapter 20 – Crypto Capitalism
- Chapter 21 – Airborne Threats
- Chapter 2 – Hacking Planes, Trains, and Automobiles
- Chapter 23 – Skimming from the Digital Till
- Chapter 24 – In Big Data We Do Not Trust
- Scott N. Schober – President and CEO, Berkeley Varitronics Systems, Inc.
- Hacked Again Book Signing
- Scott Reading Hacked Again
- Scott Speaking at Small Business Conference
- Scott N. Schober – Author, CEO & Cybersecurity Expert
- Hacked Again Hi-Res Cover
- Hacked Again – Hardcover
- Hacked Again – Hardcover
- Hacked Again – Hardcover
- Hacked Again – Softcover
- Chapter 1 – Cash in the Mattress
- Chapter 2 – Opting Into Credit Card Fraud
- Chapter 3 – Time to Switch Banks
- Chapter 4 – Website Security Tested
- 5 – Twitter Targeted
- Chapter 6 – Lockpick for the Brain
- Chapter 7 – Beware of the “Wares”
- Chapter 8 – Identity Theft
- Chapter 9 – SPAM in a Can
- Chapter 10 – Gone Phishin
- Chapter 11 – Strong Passwords Trump Lazy Hackers
- Chapter 12 – Garden-Variety Hacker
- Chapter 13 – What Color Hats Can Hackers Wear?
- Chapter 14 – The Insider Threat
- Chapter 15 – The Wireless Threat
- Chapter 16 – The Dark Web
- Chapter 17 – Effective Security Achieved in Layers
- Chapter 18 – Security is Everyone’s Business
- Chapter 19 – Take Control of Your Security
- Chapter 20 – The Target Breach
- Chapter 21 – And the Breaches Keep Coming (JP Morgan Chase Breach)
- Chapter 22 – iCloud Cyberhack: Nude Celebrity Photos Exposed
- Chapter 23 – Sony Cyberbreaches
- Chapter 24 – Office of Personnel Management: The Greatest Government Hack Ever