Countdown to Zero Day
Stuxnet and the Launch of the World's First Digital Weapon
Échec de l'ajout au panier.
Échec de l'ajout à la liste d'envies.
Échec de la suppression de la liste d’envies.
Échec du suivi du balado
Ne plus suivre le balado a échoué
Acheter pour 26,22 $
Aucun mode de paiement valide enregistré.
Nous sommes désolés. Nous ne pouvons vendre ce titre avec ce mode de paiement
-
Narrateur(s):
-
Joe Ochman
-
Auteur(s):
-
Kim Zetter
À propos de cet audio
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
“Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
In these chapters, journalist Kim Zetter tells the whole story behind the world’s first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making.
But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.
Vous pourriez aussi aimer...
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
Auteur(s): Andy Greenberg
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- Auteur(s): Andy Greenberg
- Narrateur(s): Ari Fliakos
- Durée: 10 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
A very engaging read
- Écrit par Shep le 2024-10-18
Auteur(s): Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Auteur(s): Kevin Mitnick, William L. Simon
- Narrateur(s): Ray Porter
- Durée: 13 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- Écrit par jesse b le 2022-05-20
Auteur(s): Kevin Mitnick, Autres
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Auteur(s): Cliff Stoll
- Narrateur(s): Will Damron
- Durée: 12 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Excellent writing
- Écrit par The Diggerswife le 2024-07-18
Auteur(s): Cliff Stoll
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Auteur(s): Nicole Perlroth
- Narrateur(s): Allyson Ryan
- Durée: 18 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- Écrit par Utilisateur anonyme le 2021-10-15
Auteur(s): Nicole Perlroth
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- Auteur(s): Geoff White
- Narrateur(s): Geoff White
- Durée: 8 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
If you love the podcast, buy this.
- Écrit par Amazon Customer le 2023-04-26
Auteur(s): Geoff White
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
Auteur(s): Andy Greenberg
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- Auteur(s): Andy Greenberg
- Narrateur(s): Ari Fliakos
- Durée: 10 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
A very engaging read
- Écrit par Shep le 2024-10-18
Auteur(s): Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Auteur(s): Kevin Mitnick, William L. Simon
- Narrateur(s): Ray Porter
- Durée: 13 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- Écrit par jesse b le 2022-05-20
Auteur(s): Kevin Mitnick, Autres
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Auteur(s): Cliff Stoll
- Narrateur(s): Will Damron
- Durée: 12 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Excellent writing
- Écrit par The Diggerswife le 2024-07-18
Auteur(s): Cliff Stoll
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Auteur(s): Nicole Perlroth
- Narrateur(s): Allyson Ryan
- Durée: 18 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- Écrit par Utilisateur anonyme le 2021-10-15
Auteur(s): Nicole Perlroth
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- Auteur(s): Geoff White
- Narrateur(s): Geoff White
- Durée: 8 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
If you love the podcast, buy this.
- Écrit par Amazon Customer le 2023-04-26
Auteur(s): Geoff White
-
Permanent Record
- Auteur(s): Edward Snowden
- Narrateur(s): Holter Graham
- Durée: 11 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Just Magnificent
- Écrit par Nate le 2019-09-27
Auteur(s): Edward Snowden
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- Auteur(s): David E. Sanger
- Narrateur(s): Robertson Dean
- Durée: 12 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
Great deep dive into cyberweapons
- Écrit par Alek Luopa le 2018-09-14
Auteur(s): David E. Sanger
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Auteur(s): Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- Écrit par Mr. C le 2018-02-27
Auteur(s): Kevin Mitnick, Autres
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- Auteur(s): Christopher Hadnagy, Seth Schulman
- Narrateur(s): Christopher Hadnagy
- Durée: 8 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
Auteur(s): Christopher Hadnagy, Autres
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- Auteur(s): Byron Tau
- Narrateur(s): Sean Patrick Hopkins
- Durée: 11 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring.
Auteur(s): Byron Tau
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- Auteur(s): Lester Evans
- Narrateur(s): Michael Reaves
- Durée: 3 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention.... Do you create tons of accounts you will never again visit? Does your password contain a sequence of numbers, such as “123456”? Do you automatically click all links and download all email attachments coming from your friends? This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.
-
-
Absolutely Amazing for my first audiobook
- Écrit par Kelly H le 2021-10-28
Auteur(s): Lester Evans
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- Auteur(s): Joseph Cox
- Narrateur(s): Peter Ganim
- Durée: 11 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes--the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld.
-
-
When the hunters spy on the hunted
- Écrit par Gerry Corcoran le 2024-07-16
Auteur(s): Joseph Cox
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- Auteur(s): Bruce Schneier
- Narrateur(s): Dan John Miller
- Durée: 8 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.
-
-
A Must Read
- Écrit par Candace Sundbo le 2023-10-11
Auteur(s): Bruce Schneier
-
Chip War
- The Quest to Dominate the World's Most Critical Technology
- Auteur(s): Chris Miller
- Narrateur(s): Stephen Graybill
- Durée: 12 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
You may be surprised to learn that microchips are the new oil—the scarce resource on which the modern world depends. Today, military, economic, and geopolitical power are built on a foundation of computer chips. Virtually everything—from missiles to microwaves—runs on chips, including cars, smartphones, the stock market, even the electric grid. Until recently, America designed and built the fastest chips and maintained its lead as the #1 superpower, but America’s edge is in danger of slipping, undermined by players in Taiwan, Korea, and Europe taking over manufacturing.
-
-
Transistor, transistor, transistor.
- Écrit par Vitalii le 2022-11-30
Auteur(s): Chris Miller
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Auteur(s): Joseph Menn
- Narrateur(s): Jonathan Davis
- Durée: 8 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Hard to get into
- Écrit par Blair C. le 2019-11-06
Auteur(s): Joseph Menn
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Auteur(s): Kevin Poulsen
- Narrateur(s): Eric Michael Summerer
- Durée: 8 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
Auteur(s): Kevin Poulsen
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Auteur(s): Mike Chapple, James Michael Stewart, Darril Gibson
- Narrateur(s): Tom Parks
- Durée: 65 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.
Auteur(s): Mike Chapple, Autres
Ce que les critiques en disent
“An authoritative account of Stuxnet’s spread and discovery . . . [delivers] a sobering message about the vulnerability of the systems—train lines, water-treatment plants, electricity grids—that make modern life possible.”—Economist
“Exhaustively researched . . . Zetter gives a full account of this ‘hack of the century,’ as the operation has been called, [but] the book goes well beyond its ostensible subject to offer a hair-raising introduction to the age of cyber warfare.”—The Wall Street Journal
“Part detective story, part scary-brilliant treatise on the future of warfare . . . an ambitious, comprehensive, and engrossing book that should be required reading for anyone who cares about the threats that America—and the world—are sure to be facing over the coming years.”—Kevin Mitnick, New York Times bestselling author of Ghost in the Wires and The Art of Intrusion
Ce que les auditeurs disent de Countdown to Zero Day
Moyenne des évaluations de clientsÉvaluations – Cliquez sur les onglets pour changer la source des évaluations.
-
Au global
-
Performance
-
Histoire
- AV
- 2021-11-01
Pronunciation of names
I struggled with the fact that names, for people and places, that are easily searchable online were butchered the way they were.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
-
Au global
-
Performance
-
Histoire
- Jon
- 2023-12-07
Very interesting, technical but easy enough to understand.
Very detailed with lots of good technical information. It's broken down into easy to understand explainations so you don't have to be a tech wizard to enjoy the book.
The narration is also very good, with everything said clearly, without any weird pronunciations or weird quirks.
The only negative thing I can say about this book is that it's filled with cringe analogies that really don't need to be there, in an effort to (I assume) make some things more understandable or relatable to the average person, but a lot of the time they just sound overly dramatic or out of place.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.