99,00 EGP
Description
Price: $0.99
(as of Dec 06,2024 10:26:37 UTC – Details)
Customers say
Customers find the information in the book great, deep, and well-documented. They describe the book as a worthwhile read that reads like a spy novel. Readers praise the writing style as great, easily understandable, and suspenseful. They also say the story is riveting and authentic. However, some customers feel the reporting quality is a mess and too technical at times.
AI-generated from the text of customer reviews
Gripping Story
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole PerlrothâThis Is How They Tell Me the World Endsâ tells the gripping story of a new form of warfare that takes place in the digital realm and its impact on society. New York Times Bestselling author Nicole Perlroth provides readers with an eye-opening look into the cyberweapons race and our vulnerabilities. This fascinating 505-page book includes twenty-three chapters broken out by the following seven parts: I. Mission Impossible, II. The Capitalists, III. The Spies, IV. The Mercenaries, V. The Resistance, VI. The Twister, and VII. Boomerang.Positives:1. An exhaustively researched, well-organized book that reads like a spy novel.2. The fascinating topic of cybersecurity.3. The writing style is engaging and keeps your interest.4. Defines key hacking terms such as zero-days, which are basically a software or hardware flaw for which there is no existing patch. They are called zero-days because the victims or good guys have zero days to fix them.5. It provides a lot of insights into investigative journalism. Perlroth is a part of the story as she relates the challenges she faced to uncover the cybersecurity world. âThe first rule of the zero-day market was: Nobody talks about the zero-day market. The second rule of the zero-day market was: Nobody talks about the zero-day market. Iâd posed this question many times, and I knew it was the one question nobody in this business would answer.â6. Does a great job of describing the hackers, their sponsors (if they have any) and state sponsors. âThe New Hackerâs Dictionary, which offers definitions for just about every bit of hacker jargon you can think of, defines hacker as âone who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.ââ7. Describes how hacking companies operate. âIn the mid-1990s Sabienâs team started trafficking in digital access, searching for bugs and exploiting them for customers. The bulk of his companyâs revenuesâmore than 80 percentâcame from the Pentagon and intelligence agencies, with the remainder from law enforcement and other U.S. government agencies. The goal was to deliver their government customers secret tried-and-tested ways into every system used by the adversary, be it nation-states, terrorists, or low-level criminals.â8. The purpose behind the zero-days. âOnce his zero-day was in the agencyâs hands, they could use it to spy on whomever they chose. In the United States, the likeliest targets were terrorists, foreign adversaries, or drug cartels, but there were never any guarantees that very same zero-day wouldnât come back to haunt you.â9. Uncovering the world of spies. âI asked nearly every single one of the men who guided the CIA and NSA through the turn of the century to name the father of American cyberwar, and none hesitated: âJim Gosler.ââ10. Great quotes that must be shared. âOrganizations canât stop the world from changing. The best they can do is adapt. The smart ones change before they have to. The lucky ones manage to scramble and adjust, when push comes to shove. The rest are losers, and they become history.â11. Defines the role of the TAO (Tailored Access Operations) unit inside the NSA. âIn the aftermath of 9/11, these hundreds turned to thousands as TAO accelerated its breaking-and-entering mission around the globe, through a combination of brute-force hacking, cracking passwords and algorithms, finding zero-days, writing exploits, and developing implants and malware that bent hardware and software to their will. Their job was to find every crack in every layer of the digital universe and plant themselves there for as long as possible.â12. Describes the role of hacking with regards to the Natanz Nuclear Facility in Iran. âBy late 2008 the joint operation known as Olympic Games had infiltrated Natanzâs PLCs, and nobody appeared to suspect a cyberattack.â13. Global hacking described. âThe NSA was finding evidence that Russian hackers were tampering with the same routers and switches it had exploited for years. Chinese hackers were breaking into American telecoms and internet companies and stealing passwords, blueprints, source code, and trade secrets that could be used to exploit these systems for their own ends.â14. Describes some of the stars of cybersecurity. âInside the agency, these men had been revered as âthe Maryland Five,â and time and time again, they had proved indispensable. They were each members of a premier TAO access team that hacked into the systems nobody else could. If the target was a terrorist, an arms dealer, a Chinese mole, or a nuclear scientist, you wanted the Five on it. Rarely was there a system, or a target, they could not hack.â15. Describes what happens when hackers attack corporations. âIt was time to call in the specialists. Googleâs first call was to a cybersecurity shop in Virginia called Mandiant. In the messy world of security breaches, Mandiant had carved out a niche for itself responding to cyberattacks, and was now on the speed dial of nearly every chief information officer in the Fortune 500.â16. Describes famous hacks. âThe Chinese had been inside OPMâs systems for more than a year by the time they were discovered in 2015.â17. The impact of Snowdenâs revelations. âWithout the companiesâ knowledge or cooperation, the Snowden revelations that fall showed that the NSA, and its British counterpart, GCHQ, were sucking up companiesâ data from the internetâs undersea fiber-optic cables and switches.â18. Cyber wars. âThree years after the United States and the Israelis reached across Iranâs borders and destroyed its centrifuges, Iran launched a retaliatory attack, the most destructive cyberattack the world had seen to date. On August 15, 2012, Iranian hackers hit Saudi Aramco, the worldâs richest oil companyâa company worth more than five Apples on paperâwith malware that demolished thirty thousand of its computers, wiped its data, and replaced it all with the image of the burning American flag.â19. Describes American vulnerabilities. âTheir letter was blunt: âVirtually all of our civilian critical infrastructureâincluding telecommunications, water, sanitation, transportation, and health careâdepend on the electric grid. The grid is extremely vulnerable to disruption caused by a cyber or other attack. Our adversaries already have the capability to carry out such an attack.â20. The impact of Stuxnet (computer worm responsible for the destruction of Iranian centrifuges). âStuxnet had inspired dozens of other countries to join the zero-day hunt, and the United States was losing control over the market it had once dominated.â21. Describes many attacks and the impact of misspelling. âNorth Koreaâs hackers had been caughtâbut never punishedâfor major cyber heists at banks in the Philippines, Vietnam, and at the Bangladesh Central Bank, where theyâd made a $1 billion transfer request from the New York Federal Bank. Only a spelling error (theyâd misspelled foundation as âfandationâ) had kept bankers from transferring the full billion, but theyâd still made off with $81 million, among the largest bank heists in history. WannaCry was the next evolution in North Koreaâs efforts to generate badly needed income.â22. The impact of hacks. âChina was decades behind the United States in nuclear weapons development, but thanks to Legion Amber, it had stolen everything it needed to catch up. In 2018, U.S. officials watched in horror as Beijing successfully tested a new submarine-launched ballistic missile and began moving ahead with a new class of subs that could be equipped with nuclear-armed missiles.â23. An excellent Epilogue that describes defenses against hacks. âSo-called âpassword-spraying attacksâ have surged in the past three years, in which hackers try common passwords (e.g. âpasswordâ) across multiple user accounts. Itâs not rocket science, but itâs insanely effective. Password-spraying is all it took for Iranian hackers, working at the behest of the IRGC, to break into thirty-six private American companies, multiple U.S. government agencies, and NGOs. Multifactor authentication is the best defense against these attacks.â24. Notes included.Negatives:1. This book was begging for some key supplementary material but to no avail. I can think of many examples. I would have added a table of state sponsored hacking and their main goals. Another would be list of the top hackers in the world and their strengths. List of the biggest known hacks in the world.2. No formal bibliography.3. At around 400 pages of main narrative, it will require an investment of your time.4. With so many players and intersecting stories involved it can be easy to lose yourself.5. A glossary would have been helpful.In summary, this is an excellent book that describes the vulnerabilities of our digital world and how the modern arms race have moved away from the sea and air to said digital world. Perlroth identifies the major players and countries involved in the cybersecurity arena and what their main goals are. It also tells the story of how the US had become the worldâs stockpiler of zero days and lost control of it. It reads like a spy novel but itâs real global warfare taking place in our digital realm with real-life consequences. Lack of supplementary material aside, I highly recommend this book.Further recommendations: âCyber Warâ by Richard A. Clark, âThe Personal Cybersecurity Manualâ by Marlon Buchanan, âThe Hacker and the Stateâ by Ben Buchanan, âThe Smartest Person in the Roomâ by Christian Espinosa, âHunting Cyber Criminalsâ by Vinny Troia and âSocial Engineering: The Science of Human Hacking.
Great book on the rangers facing cyber space and of information!
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth is a compelling and informative exploration of the growing threat of cyber warfare. Perlroth, a seasoned investigative reporter, skillfully guides readers through the complex world of digital espionage, hacking, and the potential for catastrophic cyberattacks.The book offers a fascinating glimpse into the shadowy world of cyber criminals and nation-states engaged in digital warfare. Perlroth’s engaging writing style makes even the most technical concepts accessible to a general audience. She delves into high-profile cyberattacks, such as the Stuxnet worm and the SolarWinds hack, providing a detailed analysis of their impact and implications.Overall, *This Is How They Tell Me the World Ends* is a must-read for anyone interested in understanding the evolving landscape of cyber threats and the urgent need for global cooperation to address them.
Solid glimpse into cyber-weapon history, exploitation, and potential future consequences.
Great history of espionage, secret gathering, hacking, zero-day exploitation, and world events over the past few decades. Working in technology sales for the past 30 years, I can say that getting people to not only understand but address threats is a huge challenge. The author states âthe cost of doing nothing now outweighs the cost of doing somethingâ â I agree with this 100% – we see it all day everyday â in our all the businesses and entities we interact with. If you enjoyed Andy Greenbergâs Sandworm, this is a deeper dive into those groups and much more. Well written and well researched â easy to read. Could have definitely cut down the content a bit as some gets to be repetitive, and the main reason I knocked this down to 4 stars is b/c the author has obvious disdain for Trump â just totally unnecessary â stay focused on the topic. My personal thoughts are that no individual leader is solving this problem (or making it worse) â you have criminal enterprise making big bucks off these exploits, not to mention nation-state snooping â two things that WILL NOT STOP â have been around in one form or another since the dawn of humanity. The epilogue has some solid advice that is widely known in our industry â unfortunately, not widely implemented. There is much room for improvement in this field at an individual and corporate level â although so much of the software and hardware in use is global, it is good to see that there are certain countries making a concerted effort to build a culture of cybersecurity â raise the tide of all boats with better cyber-hygiene (would love to set that happen in the US along with a focus on health).
Educational and Terrifying
I love this book. I have learned so much about the history of cybersecurity, the culture and evolution of hacking, and how vulnerable we really are. It is eye opening. The writing style is like a suspense novel. I complete page turner. I almost feel like this should be mandatory reading for anyone under the age of 30. This is the world we are leaving them to wade through and protect.
Definitely a good read
Cyber attacks seem to be increasing. It seems like once a month I receive a notice that my private data has been hacked. The public seems to become cavalier about these attacks. This book is a wake up call. It is more serious than the general public realizes. Occasional disruptions seem to be brushed off. This book tells us this is just a precursor of a huge catastrophe. Selling hacks has become big business. Definitely worth a read.
Recommended to anyone who wants to know abo
Recomendo a leitura. Muito bom.
and if you know computers you can tell that the author doesn’t.
One of the very best books I have read this year. I fully recommend to understand todayâs world or even Ukrainian war.
Insanely well written and well researched book about the history, dangers and current standing regarding the cyber Domain. You’ll find anything from stuxnet to Lazarus Group in it.If you’re interested in this topic or want to know a bit about it, go for it.It’s not really technical at all, so you can easily understand it without having any prior knowledge of the subject