BookShared
  • MEMBER AREA    
  • Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

    (By Kim Zetter)

    Book Cover Watermark PDF Icon Read Ebook
    ×
    Size 25 MB (25,084 KB)
    Format PDF
    Downloaded 640 times
    Last checked 12 Hour ago!
    Author Kim Zetter
    “Book Descriptions: In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at a uranium enrichment plant in Iran were failing and being replaced at an unprecedented rate. The cause of their failure was a complete mystery.

    Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.

    Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away.

    And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.

    Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.”

    Google Drive Logo DRIVE
    Book 1

    Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

    ★★★★★

    Andy Greenberg

    Book 1

    Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

    ★★★★★

    Joseph Menn

    Book 1

    Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency

    ★★★★★

    Andy Greenberg

    Book 1

    Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

    ★★★★★

    Kevin D. Mitnick

    Book 1

    Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door

    ★★★★★

    Brian Krebs

    Book 1

    The Perfect Weapon: How the Cyber Arms Race Set the World Afire

    ★★★★★

    David E. Sanger

    Book 1

    Dark Territory: The Secret History of Cyber War

    ★★★★★

    Fred Kaplan

    Book 1

    This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

    ★★★★★

    Nicole Perlroth

    Book 1

    The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

    ★★★★★

    Kevin D. Mitnick

    Book 1

    Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks

    ★★★★★

    Scott J. Shapiro

    Book 1

    Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy

    ★★★★★

    Laurent Richard

    Book 1

    The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War

    ★★★★★

    Geoff White

    Book 1

    Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

    ★★★★★

    Kevin Poulsen

    Book 1

    Dark Wire: The Incredible True Story of the Largest Sting Operation Ever

    ★★★★★

    Joseph Cox

    Book 1

    The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats

    ★★★★★

    Richard A. Clarke

    Book 1

    Chip War: The Fight for the World's Most Critical Technology

    ★★★★★

    Chris Miller

    Book 1

    Character Limit: How Elon Musk Destroyed Twitter

    ★★★★★

    Kate Conger