Gratuit avec l'essai de 30 jours
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- Narrateur(s): Robertson Dean
- Durée: 12 h et 53 min
Échec de l'ajout au panier.
Échec de l'ajout à la liste d'envies.
Échec de la suppression de la liste d’envies.
Échec du suivi du balado
Ne plus suivre le balado a échoué
Acheter pour 26,22$
Aucun mode de paiement valide enregistré.
Nous sommes désolés. Nous ne pouvons vendre ce titre avec ce mode de paiement
Vous pourriez aussi aimer...
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Auteur(s): Nicole Perlroth
- Narrateur(s): Allyson Ryan
- Durée: 18 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- Écrit par Utilisateur anonyme le 2021-10-15
Auteur(s): Nicole Perlroth
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
Auteur(s): Kim Zetter
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- Auteur(s): Scott J. Shapiro
- Narrateur(s): Jonathan Todd Ross
- Durée: 15 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
Auteur(s): Scott J. Shapiro
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
Auteur(s): Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Auteur(s): Kevin Mitnick
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- Écrit par Mr. C le 2018-02-27
Auteur(s): Kevin Mitnick
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- Auteur(s): Andy Greenberg
- Narrateur(s): Ari Fliakos
- Durée: 10 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Loved this
- Écrit par janie g le 2023-04-22
Auteur(s): Andy Greenberg
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Auteur(s): Nicole Perlroth
- Narrateur(s): Allyson Ryan
- Durée: 18 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- Écrit par Utilisateur anonyme le 2021-10-15
Auteur(s): Nicole Perlroth
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
Auteur(s): Kim Zetter
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- Auteur(s): Scott J. Shapiro
- Narrateur(s): Jonathan Todd Ross
- Durée: 15 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
Auteur(s): Scott J. Shapiro
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
Auteur(s): Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Auteur(s): Kevin Mitnick
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- Écrit par Mr. C le 2018-02-27
Auteur(s): Kevin Mitnick
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- Auteur(s): Andy Greenberg
- Narrateur(s): Ari Fliakos
- Durée: 10 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Loved this
- Écrit par janie g le 2023-04-22
Auteur(s): Andy Greenberg
Description
Soon to be an HBO® documentary from award-winning director John Maggio
“An important - and deeply sobering - new book about cyberwarfare.” (Nicholas Kristof, New York Times)
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the United States and its allies. And if Obama would begin his presidency by helping to launch the new era of cyberwar, he would end it struggling unsuccessfully to defend against Russia’s broad attack on the 2016 US election.
Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger reveals a world coming face-to-face with the perils of technological revolution, where everyone is a target.
“Timely and bracing.... With the deep knowledge and bright clarity that have long characterized his work, Sanger recounts the cunning and dangerous development of cyberspace into the global battlefield of the 21st century.” (Washington Post)
Ce que les critiques en disent
"[Sanger's] description of the cyber portion of Russia's interference in the 2016 presidential election is thorough and convincing. It ought to be required reading for anyone who doubts the extent and seriousness of the Russian effort.... The great value of The Perfect Weapon is less in its specific policy prescriptions than in its being the most comprehensive, readable source of information and insight about the policy quandaries that modern information technology and its destructive potential have spawned." (The New York Times)
"In his new book, The Perfect Weapon, Sanger offers a panoramic view of the rapidly evolving world of cyber-conflict. He covers incidents from the covert US cyber-campaign to sabotage Iran’s nuclear program (a story we know about largely because of Sanger’s diligent reporting) to Edward Snowden’s epic heist of National Security Agency data. And yes, there’s also plenty of background on Russia’s active measures during the 2016 campaign. But there’s also a wealth of gripping material on stories that have probably been missed by the broader public.... It all adds up to a persuasive argument for the truth of the book’s title." (Christian Caryl, The Washington Post)
"[The Perfect Weapon] reads like a thriller spy novel, except the stories are true, which makes the book more terrifying.... Sanger shows the political, military, and economic impacts of actual hacks, moves made by governments and industry to counter moves and protect against future attacks, and the counter to the counter to the counter, all told at a breathtaking pace. But this is more than just a real-life drama; it also is a cautionary tale of the policy of information power.... This book at turns was both fascinating in its detail and access and terrifying in its implications." (Proceedings)
D'autres livres audio du même...
auteur:
Ce que les auditeurs disent de The Perfect Weapon
Moyenne des évaluations de clientsÉvaluations – Cliquez sur les onglets pour changer la source des évaluations.
-
Au global
-
Performance
-
Histoire
- Alek Luopa
- 2018-09-14
Great deep dive into cyberweapons
Truly fascinating book. Sheds new light on current and future cyber threats and the efforts governments take to keep their digital arsenals secret. Great listen! #Audible1
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
1 personne a trouvé cela utile
-
Au global
-
Performance
-
Histoire
- Amazon Customer
- 2018-09-13
Excellent Book and Great Narrator
#Audible1
Love this book. Very relevant in this day and age.
Everyone should listen to this book.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
1 personne a trouvé cela utile