An Eye-Opening Look Behind the Scenes of the Exploit Trade
5 stars
Read this book on the reccomendation of a friend. Frankly, this should be required reading for any CS student. Not overly technical, it focuses more on the people and social aspect, and brings attention to just how intertwined and vulnerable our digital lives are in the modern world.
A nice bible of the big cyberattacks that shaped our world
4 stars
This is a great little bible of leaks & cyberattacks of the last decade that
have shaped our modern world. Nicole's work at New York Times gave her access to
curious set of characters. From Italian contractor-hackers for hire, through
Argentine's old guard hacking for fun all the way to elite NSA hackers hacking
for their country.
Most of the stories were not new for me, but she packaged them up for ordinary
people. Accessible, readable and fun. Full of detail but short on technical
jargon. There's a lot of notes in the back of the book to back up most of the
stories as well. If you've never heard of Stuxnet, Petya, WannaCry and others,
this book might make you throw away your iPhone/Android and any other electronic
device.
I suppose a small consolation for people might be: Unless you build nuclear
centrifuges or are a political activist in …
This is a great little bible of leaks & cyberattacks of the last decade that
have shaped our modern world. Nicole's work at New York Times gave her access to
curious set of characters. From Italian contractor-hackers for hire, through
Argentine's old guard hacking for fun all the way to elite NSA hackers hacking
for their country.
Most of the stories were not new for me, but she packaged them up for ordinary
people. Accessible, readable and fun. Full of detail but short on technical
jargon. There's a lot of notes in the back of the book to back up most of the
stories as well. If you've never heard of Stuxnet, Petya, WannaCry and others,
this book might make you throw away your iPhone/Android and any other electronic
device.
I suppose a small consolation for people might be: Unless you build nuclear
centrifuges or are a political activist in Saudi Arabia, Uighur in China or some
high profile individual in politics - nobody will "burn" their expensive
zero-day bug just to get into your devices. The costs have risen significantly
over the years (to millions of dollars for each).
This book covers the big picture. Zero-days, nation-states spying on each other,
industrial espionage, ransomware of the highest order and more. It might work as
an overview for future policy decisions. What the book misses is the
recommendations for the ordinary people. Can they avoid being collateral damage
in this war of the titans?
Worst attacks happen because people run out of date software riddled with bugs
that have long been patched in the new versions. There's a hint of this
recommendation buried in the book in one or two places. But I feel like that was
a missed opportunity.
This is a cool, fast flying top-level view of the world of cyber weapons which surprisingly has tendrils everywhere. While I’m familiar with the stories told, I hadn’t thought about them in the interconnected manner that they truly are which is a good exercise for tech folks to consider.