Listen free for 30 days
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wish list failed.
Follow podcast failed
Unfollow podcast failed
Buy Now for $40.04
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
You may also enjoy...
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Written by: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- By Anonymous User on 2021-10-15
Written by: Nicole Perlroth
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Written by: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- By Jon on 2023-12-07
Written by: Kim Zetter
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- Written by: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
Written by: Scott J. Shapiro
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Written by: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- By Mr. C on 2018-02-27
Written by: Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Written by: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- By Jake L.S. on 2020-01-18
Written by: Andy Greenberg
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Written by: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Okay
- By AmazonShopper on 2024-03-04
Written by: Christopher Hadnagy
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Written by: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- By Anonymous User on 2021-10-15
Written by: Nicole Perlroth
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Written by: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- By Jon on 2023-12-07
Written by: Kim Zetter
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- Written by: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
Written by: Scott J. Shapiro
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Written by: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- By Mr. C on 2018-02-27
Written by: Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Written by: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- By Jake L.S. on 2020-01-18
Written by: Andy Greenberg
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Written by: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Okay
- By AmazonShopper on 2024-03-04
Written by: Christopher Hadnagy
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- Written by: Geoff White
- Narrated by: Geoff White
- Length: 8 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
If you love the podcast, buy this.
- By Amazon Customer on 2023-04-26
Written by: Geoff White
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- Written by: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Loved this
- By janie g on 2023-04-22
Written by: Andy Greenberg
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Written by: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Engaging, thrilling
- By Chris Burchett on 2023-01-20
Written by: Cliff Stoll
-
Rise and Kill First
- The Secret History of Israel's Targeted Assassinations
- Written by: Ronen Bergman
- Narrated by: Rob Shapiro
- Length: 25 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Talmud says: “If someone comes to kill you, rise up and kill him first.” This instinct to take every measure, even the most aggressive, to defend the Jewish people is hardwired into Israel’s DNA. From the very beginning of its statehood in 1948, protecting the nation from harm has been the responsibility of its intelligence community and armed services, and there is one weapon in their vast arsenal that they have relied upon to thwart the most serious threats: Targeted assassinations have been used countless times, on enemies large and small....
-
-
Great
- By Kindle Customer on 2019-01-02
Written by: Ronen Bergman
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Written by: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Hard to get into
- By Blair C. on 2019-11-06
Written by: Joseph Menn
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- Written by: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
Written by: Richard A. Clarke, and others
Publisher's Summary
Soon to be an HBO® documentary from award-winning director John Maggio
“An important - and deeply sobering - new book about cyberwarfare.” (Nicholas Kristof, New York Times)
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the United States and its allies. And if Obama would begin his presidency by helping to launch the new era of cyberwar, he would end it struggling unsuccessfully to defend against Russia’s broad attack on the 2016 US election.
Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger reveals a world coming face-to-face with the perils of technological revolution, where everyone is a target.
“Timely and bracing.... With the deep knowledge and bright clarity that have long characterized his work, Sanger recounts the cunning and dangerous development of cyberspace into the global battlefield of the 21st century.” (Washington Post)
What the critics say
"[Sanger's] description of the cyber portion of Russia's interference in the 2016 presidential election is thorough and convincing. It ought to be required reading for anyone who doubts the extent and seriousness of the Russian effort.... The great value of The Perfect Weapon is less in its specific policy prescriptions than in its being the most comprehensive, readable source of information and insight about the policy quandaries that modern information technology and its destructive potential have spawned." (The New York Times)
"In his new book, The Perfect Weapon, Sanger offers a panoramic view of the rapidly evolving world of cyber-conflict. He covers incidents from the covert US cyber-campaign to sabotage Iran’s nuclear program (a story we know about largely because of Sanger’s diligent reporting) to Edward Snowden’s epic heist of National Security Agency data. And yes, there’s also plenty of background on Russia’s active measures during the 2016 campaign. But there’s also a wealth of gripping material on stories that have probably been missed by the broader public.... It all adds up to a persuasive argument for the truth of the book’s title." (Christian Caryl, The Washington Post)
"[The Perfect Weapon] reads like a thriller spy novel, except the stories are true, which makes the book more terrifying.... Sanger shows the political, military, and economic impacts of actual hacks, moves made by governments and industry to counter moves and protect against future attacks, and the counter to the counter to the counter, all told at a breathtaking pace. But this is more than just a real-life drama; it also is a cautionary tale of the policy of information power.... This book at turns was both fascinating in its detail and access and terrifying in its implications." (Proceedings)
More from the same
What listeners say about The Perfect Weapon
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Alek Luopa
- 2018-09-14
Great deep dive into cyberweapons
Truly fascinating book. Sheds new light on current and future cyber threats and the efforts governments take to keep their digital arsenals secret. Great listen! #Audible1
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Amazon Customer
- 2018-09-13
Excellent Book and Great Narrator
#Audible1
Love this book. Very relevant in this day and age.
Everyone should listen to this book.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful