Listen free for 30 days
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
Add to Cart failed.
Add to Wish List failed.
Remove from wish list failed.
Follow podcast failed
Unfollow podcast failed
Buy Now for $39.48
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Buy it with
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- Written by: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Satisfying
- By Sisley, Melanie on 2023-01-11
Written by: Andy Greenberg
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Written by: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.
-
-
Pronunciation of names
- By AV on 2021-11-01
Written by: Kim Zetter
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Written by: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Engaging, thrilling
- By Chris Burchett on 2023-01-20
Written by: Cliff Stoll
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- Written by: Geoff White
- Narrated by: Geoff White
- Length: 8 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
Written by: Geoff White
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Written by: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Essential
- By AW on 2022-11-11
Written by: Nicole Perlroth
-
The Art of Attack
- Attacker Mindset for Security Professionals
- Written by: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
Written by: Maxie Reynolds
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- Written by: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Satisfying
- By Sisley, Melanie on 2023-01-11
Written by: Andy Greenberg
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Written by: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.
-
-
Pronunciation of names
- By AV on 2021-11-01
Written by: Kim Zetter
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Written by: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Engaging, thrilling
- By Chris Burchett on 2023-01-20
Written by: Cliff Stoll
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- Written by: Geoff White
- Narrated by: Geoff White
- Length: 8 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
Written by: Geoff White
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Written by: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Essential
- By AW on 2022-11-11
Written by: Nicole Perlroth
-
The Art of Attack
- Attacker Mindset for Security Professionals
- Written by: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
Written by: Maxie Reynolds
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Written by: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
Written by: Kevin Poulsen
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Written by: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Hard to get into
- By Blair C. on 2019-11-06
Written by: Joseph Menn
-
Putin's Playbook
- Russia's Secret Plan to Defeat America
- Written by: Rebekah Koffler
- Narrated by: Joyce Sternton
- Length: 13 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Politicians and pundits on both sides of the aisle have accused Russia of interfering with our elections and our intelligence agencies. But the war Russia is waging against America is very different from anything you have heard in the press, as Russian-born US intelligence expert Rebekah Koffler reveals. In Putin’s Playbook, Koffler details how Vladimir Putin is orchestrating a wide-ranging, multifaceted campaign to retake his country’s role as a superpower and to defeat America in the process.
-
-
Incredible insight into American intelligence and poutine
- By Cedric Canu on 2022-06-07
Written by: Rebekah Koffler
-
The Art of Deception
- Controlling the Human Element of Security
- Written by: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
Written by: Kevin Mitnick
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- Written by: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
Great deep dive into cyberweapons
- By Alek Luopa on 2018-09-14
Written by: David E. Sanger
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Written by: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- By jesse b on 2022-05-20
Written by: Kevin Mitnick, and others
-
Active Measures
- The Secret History of Disinformation and Political Warfare
- Written by: Thomas Rid
- Narrated by: Derek Perkins
- Length: 14 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
We live in the age of disinformation - of organized deception. Spy agencies pour vast resources into hacking, leaking, and forging data, often with the goal of weakening the very foundation of liberal democracy: trust in facts. Thomas Rid, a renowned expert on technology and national security, was one of the first to sound the alarm, even before the 2016 election. But this is not new. The story of modern disinformation begins with the clash between communism and capitalism after the Russian Revolution.
-
-
Neat history
- By AxWRR53 on 2022-05-07
Written by: Thomas Rid
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- Written by: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Eye-opening!
- By Bradley Banks on 2019-02-01
Written by: John P. Carlin, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Written by: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- By Mr. C on 2018-02-27
Written by: Kevin Mitnick
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- Written by: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
Informative
- By Robin M. on 2022-10-29
Written by: Ben Buchanan
-
Chip War
- The Quest to Dominate the World's Most Critical Technology
- Written by: Chris Miller
- Narrated by: Stephen Graybill
- Length: 12 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
You may be surprised to learn that microchips are the new oil—the scarce resource on which the modern world depends. Today, military, economic, and geopolitical power are built on a foundation of computer chips. Virtually everything—from missiles to microwaves—runs on chips, including cars, smartphones, the stock market, even the electric grid. Economic historian Chris Miller explains how the technology works and why it’s so important.
-
-
Transistor, transistor, transistor.
- By Vitalii on 2022-11-30
Written by: Chris Miller
-
American Kingpin
- The Epic Hunt for the Criminal Mastermind Behind the Silk Road
- Written by: Nick Bilton
- Narrated by: Will Damron
- Length: 12 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2011, a 26-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine website hosted on the Dark Web where anyone could trade anything - drugs, hacking software, forged passports, counterfeit cash, poisons - free of the government's watchful eye. It wasn't long before the media got wind of the new website where anyone - not just teenagers and weed dealers but terrorists and black hat hackers - could buy and sell contraband detection-free.
-
-
Best Audible purchase I’ve made
- By P K on 2019-08-04
Written by: Nick Bilton
Publisher's Summary
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it.
"Much more than a true-life techno-thriller...a tour through a realm that is both invisible and critical to the daily lives of every person alive in the 21st century." (Los Angeles Times)
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses - from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented 10 billion dollars in damage - the largest, most devastating cyberattack the world had ever seen.
The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military, and civilians alike.
A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur - with world-shaking implications.
What the critics say
Winner of the Cornelius Ryan Citation for Excellence from the Overseas Press Club of America
“As Russia has attacked, Greenberg has not been far behind, reporting on these incursions in Wired while searching for their perpetrators. Like the best true-crime writing, his narrative is both perversely entertaining and terrifying.” (New York Review of Books)
“Immensely readable.... A hair-raising, cautionary tale about the burgeoning, post-Stuxnet world of state-sponsored hackers.... Greenberg lays out in chilling detail how future wars will be waged in cyberspace and makes the case that we have done little, as of yet, to prevent it.” (Washington Post)
"[A] chilling account of a Kremlin-led cyber attack, a new front in global conflict." (Financial Times)
More from the same
What listeners say about Sandworm
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Amazon Customer
- 2021-04-22
An alarming review of the current cyber threat landscape
A very informative and very frightening account of the new cyber reality. I enjoyed it thoroughly.
-
Overall
-
Performance
-
Story
- Negative Nancy
- 2021-03-08
Eye-opening but ear-shattering
Great book, very eye opening, and I feel like we're going to see a sequel to it, whether we like it or not. But the narrator really misses the mark with the voices. If you're going to try to do different voices in a documentary, at least try to watch the interviews to hear what they sound like. If the reader knows what the people mentioned actually sound like, the narrator doing them wrong really ruins the experience.
-
Overall
-
Performance
-
Story
- HRPuff&Stuff
- 2020-12-25
When the lights go out, is it the FSB troll farms?
This book starts with the lights going out in the Ukraine, and follows a number of international cybersecurity firms and personalities tracking the origins and damage of the Sandworm group, a Russian cyberintelligence group looking for ways to hack physical infrastructure rather than less damaging ransomware or stealing of secrets. Imagine a virus that can make a nuclear power plant overheat, a dam overflow, airport runway navigation altered, etc. Sandworm is still out there and it is not clear what physical damage is planned for the future. The book is well written and offers the average reader a clear understanding of the dangers of cyberwarfare when deployed to disrupt physical infrastructure in other countries.
-
Overall
-
Performance
-
Story
- Jake L.S.
- 2020-01-18
Surprisingly more boring than I thought.
This was surprisingly more boring than I thought it was gonna be. had trouble getting through it all. Cybercrimes are an issue. I guess?
-
Overall
-
Performance
-
Story
- Olu
- 2020-01-10
Scary
This scared me. For myself, for the world, for the future.
Well written, almost sound like a far fetched fiction, except it’s not.
-
Overall
-
Performance
-
Story

- ndru1
- 2019-11-12
Thru the eyes of the Sandworm's hunters and prey
I've always enjoyed Wired's in-depth reporting on major cyber attacks, so when Andy Greenberg put out a book last week I grabbed it. While many recent books have been about stolen personal data and influence campaigns by China and North Korea, this books has a clear focus: weapons of cyber destruction by Russia.
Chronogically, the book starts with the first attack on the Ukrainian power grid in 2015. This attack use the Dark Energy malware, which included the first of many references to Frank Herbert's Dune, hence Sandworm. If you have read other books on cyber war, you can probably skip the first two sections.
It gets interesting in Section 3 with the second hack on the Ukrainian power grid, in which experts note that the attackers held back from doing their worst possible damage. The group was also responsible for NotPetya, the most damaging cyber attack till date that ravaged the Ukraine and also several MNCs, who had links to Ukraine.
Greenberg also links the group to the hacking of various elections and concludes that all these attacks - whether noisy influence campaigns or stealthy destruction of infrastructure - are all by Russia's GRU and all have the primary goal of influence.
What makes the book very readable is seeing the story of each attach unfold through the viewpoints of key players in each incident. So while I may have revealed some of the takeaway, I am definitely not spoiling the enjoyment of anyone who wants to read it.
For some samples of Greenberg's writing (you can skip these sections in the book later):
https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/
https://www.wired.com/story/crash-override-malware/
https://www.wired.com/story/untold-story-2018-olympics-destroyer-cyberattack/
19 people found this helpful
-
Overall
-
Performance
-
Story

- saidshe
- 2020-02-12
Listening a second time.
I restarted the book from the beginning as soon as I finished it the first time. On the second listen I was better with tracking the dates & main characters. The writing is as smooth as the voiceover & I've rarely found that to be true. Especially with non-fiction. The author reveals shocking details that I can't believe the general public isn't aware of. We should all know what's coming.
If you're easily frightened about doomsday scenarios, you won't care for this book.
I can't fathom that any human being could find out this much info, weave it together a great narrative & turn it into a great book.
13 people found this helpful
-
Overall
-
Performance
-
Story

- Scott
- 2019-11-10
An important expose - well researched, frightening & prescient.
This is a supremely important expose of the development, use and effects of state-sponsored computer hacking as warfare - initially Russian in Ukraine, and now while still primarily by Russia, carried out be other nations including the US. As the US still steadfastly refuses to promote international, Geneva-style sanctions on these immensely dangerous and potentially catastrophic crimes (because such limitations would limit US offensive opportunity) I am reminded of the opposition John Kennedy faced from his Joint Chiefs when he attempted to work with Khrushchev to curb the proliferation of nuclear weapons, advocating instead for a nuclear first strike, claiming that while the US might lose 30 million people, we’d ultimately win because the USSR would lose more. This book is a prescient warning and analysis - at a time where we still have the opportunity to advocate a change in course.
13 people found this helpful
-
Overall
-
Performance
-
Story

- TJ
- 2019-12-03
Riveting Revelation
Global codex, keys to the kingdom, comfort or paranoia, offense or defense...you pick. The revelation of this book, transcends everything we think we know about the grid. Are we moving headlong into a New Stone Age, perhaps. I now see my computer and access to the globe in light or not so light. Next time you see me I’ll be.......end of line.
9 people found this helpful
-
Overall
-
Performance
-
Story

- 1337reviewer
- 2020-01-24
Thrilling. True. Currently on-going .
Very much worth listening to, especially by members of the infosec community at Silicon Valley companies. The narrator is earnest and there are slight technical inaccuracies but this is because it is a complex topic and the author, coming from outside the field, did his honest best. Any minor confusion or incorrect descriptions is minor and does not detract from the narrative: a real-life spy thriller that’s happening •today•.
7 people found this helpful
-
Overall
-
Performance
-
Story

- Curtiss
- 2020-01-12
Fascinating & Frightening!
You don’t have to be a computer nerd to easily follow along and see the profound implications the subject of this book has had in ALL our lives in the past decade or two and what we may be in store for in the near future. Fascinating and frightening.
7 people found this helpful
-
Overall
-
Performance
-
Story

- Roger R.
- 2019-12-02
How hacking has become the new war front
The author is well researched and so how cyber warfare has progressed. Also found that while the Russian GRU is a big problem. the US government is not with out it's issues.
7 people found this helpful
-
Overall
-
Performance
-
Story

- stan
- 2021-08-29
Very Informative & well researched
The author obviously hates Trump and should have kept his politics out of the book
5 people found this helpful
-
Overall
-
Performance
-
Story

- TF
- 2019-11-23
Excellent
I really enjoyed this book. Thoroughly researched, the book introduces the theme which the overall book is built on and breaks it down into a handful of incident related stories that make for really easy reading, at least for those who have even the most basic knowledge of cyber attacks or even an interest in online security. In short, the author does a fantastic job of turning what could be, and is often done so in similar books on the topic, really esoteric information laid out page after page into a fast paced read. If you have any idea of or have read about Stuxnet, this book will 100% appeal to you.
5 people found this helpful
-
Overall
-
Performance
-
Story

- Krmartin
- 2021-05-27
Important and Compelling...But...
Incredibly important work. Great detail. Unfortunately, I once again find the authors credibility damaged by the petty and utterly ridiculous partisan attacks. Obama watches the first Ukrainian attack and failed in every way to counter this threat, unleashed his own uncontrollable cyber warfare, likely ignored NK hacking, did nothing to the Russians as they hacked the DNC (until 12/2015) - just to name a few of the failings of those EIGHT years. But Trump? Well, the author makes fun of Trump’s technological skills (no proof), brings up unproven, debunked Russian gate and spends way too much time holding Trump to a standard that apparently only applies to conservatives/Trump. The author sounds like another frustrated anti-Trump hater who gives Obama a pass for outrageous failings while trashing Trump. I think this is an important book. I am no partisan Trump fan. But the treatment of Trump compared to Obama is ridiculous. Eight years - Obama did nothing. Gross negligence. Time for liberal authors to grow up.
4 people found this helpful
-
Overall
-
Performance
-
Story

- Vincent
- 2020-01-08
In audible!
Speech jerky, listening is painful so I did not listen for more than 10 minutes despite the interest of the subject
The voice just sounds like SIRI... disappointing
1 person found this helpful