-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $31.50
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.
-
-
Overzealous editing and lifeless reading
- By John Tangney on 03-01-20
By: Kim Zetter
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
My favorite non-fiction book!
- By Philip Lowe on 08-28-20
By: Cliff Stoll
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
BY FAR the best book to date on this topic!
- By aaron on 07-09-18
By: David E. Sanger
-
Permanent Record
- By: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- By Ryan L on 09-22-19
By: Edward Snowden
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.
-
-
Overzealous editing and lifeless reading
- By John Tangney on 03-01-20
By: Kim Zetter
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
My favorite non-fiction book!
- By Philip Lowe on 08-28-20
By: Cliff Stoll
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
BY FAR the best book to date on this topic!
- By aaron on 07-09-18
By: David E. Sanger
-
Permanent Record
- By: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- By Ryan L on 09-22-19
By: Edward Snowden
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
Great listen for tech fans
- By Mikeyxote on 06-01-12
By: Kevin Mitnick, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- By: Geoff White
- Narrated by: Geoff White
- Length: 8 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
True Crime - Mission Impossible Style
- By Janet on 06-21-22
By: Geoff White
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- By: Brian Krebs
- Narrated by: Christopher Lane
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
-
-
Risky topic, but Br. Krebs hits it out of the park
- By RRiley on 12-21-14
By: Brian Krebs
-
The Age of Surveillance Capitalism
- The Fight for a Human Future at the New Frontier of Power
- By: Shoshana Zuboff
- Narrated by: Nicol Zanzarella
- Length: 24 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Age of Surveillance Capitalism is neither a hand-wringing narrative of danger and decline nor a digital fairy tale. Rather, it offers a deeply reasoned and evocative examination of the contests over the next chapter of capitalism that will decide the meaning of information civilization in the 21st century. The stark issue at hand is whether we will be the masters of information and machines or its slaves.
-
-
One of the most important books of the decade
- By Steve on 04-28-19
By: Shoshana Zuboff
-
Worm
- The First Digital World War
- By: Mark Bowden
- Narrated by: Christopher Lane
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide. When Conficker was unleashed in November 2008, cybersecurity experts did not know what to make of it. Exploiting security flaws in Microsoft Windows, it grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks.
-
-
Clear, Concise Story of the Conficker Worm
- By Julie on 10-21-11
By: Mark Bowden
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
Interesting & knowledgeable but lacks captivation
- By WT on 04-04-15
By: Kevin Poulsen
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- By: Christian Brose
- Narrated by: Christian Brose
- Length: 9 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network" - the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- By Tomas Singliar on 06-06-20
By: Christian Brose
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- By: Amy B. Zegart
- Narrated by: Amy B. Zegart
- Length: 11 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Too political
- By Joel on 02-15-22
By: Amy B. Zegart
Publisher's Summary
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it.
"Much more than a true-life techno-thriller...a tour through a realm that is both invisible and critical to the daily lives of every person alive in the 21st century." (Los Angeles Times)
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses - from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented 10 billion dollars in damage - the largest, most devastating cyberattack the world had ever seen.
The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military, and civilians alike.
A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur - with world-shaking implications.
Critic Reviews
Winner of the Cornelius Ryan Citation for Excellence from the Overseas Press Club of America
“As Russia has attacked, Greenberg has not been far behind, reporting on these incursions in Wired while searching for their perpetrators. Like the best true-crime writing, his narrative is both perversely entertaining and terrifying.” (New York Review of Books)
“Immensely readable.... A hair-raising, cautionary tale about the burgeoning, post-Stuxnet world of state-sponsored hackers.... Greenberg lays out in chilling detail how future wars will be waged in cyberspace and makes the case that we have done little, as of yet, to prevent it.” (Washington Post)
"[A] chilling account of a Kremlin-led cyber attack, a new front in global conflict." (Financial Times)
More from the same
What listeners say about Sandworm
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- ndru1
- 11-12-19
Thru the eyes of the Sandworm's hunters and prey
I've always enjoyed Wired's in-depth reporting on major cyber attacks, so when Andy Greenberg put out a book last week I grabbed it. While many recent books have been about stolen personal data and influence campaigns by China and North Korea, this books has a clear focus: weapons of cyber destruction by Russia.
Chronogically, the book starts with the first attack on the Ukrainian power grid in 2015. This attack use the Dark Energy malware, which included the first of many references to Frank Herbert's Dune, hence Sandworm. If you have read other books on cyber war, you can probably skip the first two sections.
It gets interesting in Section 3 with the second hack on the Ukrainian power grid, in which experts note that the attackers held back from doing their worst possible damage. The group was also responsible for NotPetya, the most damaging cyber attack till date that ravaged the Ukraine and also several MNCs, who had links to Ukraine.
Greenberg also links the group to the hacking of various elections and concludes that all these attacks - whether noisy influence campaigns or stealthy destruction of infrastructure - are all by Russia's GRU and all have the primary goal of influence.
What makes the book very readable is seeing the story of each attach unfold through the viewpoints of key players in each incident. So while I may have revealed some of the takeaway, I am definitely not spoiling the enjoyment of anyone who wants to read it.
For some samples of Greenberg's writing (you can skip these sections in the book later):
https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/
https://www.wired.com/story/crash-override-malware/
https://www.wired.com/story/untold-story-2018-olympics-destroyer-cyberattack/
18 people found this helpful
-
Overall
-
Performance
-
Story
- Scott
- 11-10-19
An important expose - well researched, frightening & prescient.
This is a supremely important expose of the development, use and effects of state-sponsored computer hacking as warfare - initially Russian in Ukraine, and now while still primarily by Russia, carried out be other nations including the US. As the US still steadfastly refuses to promote international, Geneva-style sanctions on these immensely dangerous and potentially catastrophic crimes (because such limitations would limit US offensive opportunity) I am reminded of the opposition John Kennedy faced from his Joint Chiefs when he attempted to work with Khrushchev to curb the proliferation of nuclear weapons, advocating instead for a nuclear first strike, claiming that while the US might lose 30 million people, we’d ultimately win because the USSR would lose more. This book is a prescient warning and analysis - at a time where we still have the opportunity to advocate a change in course.
13 people found this helpful
-
Overall
-
Performance
-
Story
- saidshe
- 02-12-20
Listening a second time.
I restarted the book from the beginning as soon as I finished it the first time. On the second listen I was better with tracking the dates & main characters. The writing is as smooth as the voiceover & I've rarely found that to be true. Especially with non-fiction. The author reveals shocking details that I can't believe the general public isn't aware of. We should all know what's coming.
If you're easily frightened about doomsday scenarios, you won't care for this book.
I can't fathom that any human being could find out this much info, weave it together a great narrative & turn it into a great book.
11 people found this helpful
-
Overall
-
Performance
-
Story
- TJ
- 12-03-19
Riveting Revelation
Global codex, keys to the kingdom, comfort or paranoia, offense or defense...you pick. The revelation of this book, transcends everything we think we know about the grid. Are we moving headlong into a New Stone Age, perhaps. I now see my computer and access to the globe in light or not so light. Next time you see me I’ll be.......end of line.
9 people found this helpful
-
Overall
-
Performance
-
Story
- 1337reviewer
- 01-24-20
Thrilling. True. Currently on-going .
Very much worth listening to, especially by members of the infosec community at Silicon Valley companies. The narrator is earnest and there are slight technical inaccuracies but this is because it is a complex topic and the author, coming from outside the field, did his honest best. Any minor confusion or incorrect descriptions is minor and does not detract from the narrative: a real-life spy thriller that’s happening •today•.
7 people found this helpful
-
Overall
-
Performance
-
Story
- Curtiss J.
- 01-12-20
Fascinating & Frightening!
You don’t have to be a computer nerd to easily follow along and see the profound implications the subject of this book has had in ALL our lives in the past decade or two and what we may be in store for in the near future. Fascinating and frightening.
7 people found this helpful
-
Overall
-
Performance
-
Story
- Roger R.
- 12-02-19
How hacking has become the new war front
The author is well researched and so how cyber warfare has progressed. Also found that while the Russian GRU is a big problem. the US government is not with out it's issues.
7 people found this helpful
-
Overall
-
Performance
-
Story
- stan
- 08-29-21
Very Informative & well researched
The author obviously hates Trump and should have kept his politics out of the book
5 people found this helpful
-
Overall
-
Performance
-
Story
- TF
- 11-23-19
Excellent
I really enjoyed this book. Thoroughly researched, the book introduces the theme which the overall book is built on and breaks it down into a handful of incident related stories that make for really easy reading, at least for those who have even the most basic knowledge of cyber attacks or even an interest in online security. In short, the author does a fantastic job of turning what could be, and is often done so in similar books on the topic, really esoteric information laid out page after page into a fast paced read. If you have any idea of or have read about Stuxnet, this book will 100% appeal to you.
5 people found this helpful
-
Overall
-
Performance
-
Story
- Krmartin
- 05-27-21
Important and Compelling...But...
Incredibly important work. Great detail. Unfortunately, I once again find the authors credibility damaged by the petty and utterly ridiculous partisan attacks. Obama watches the first Ukrainian attack and failed in every way to counter this threat, unleashed his own uncontrollable cyber warfare, likely ignored NK hacking, did nothing to the Russians as they hacked the DNC (until 12/2015) - just to name a few of the failings of those EIGHT years. But Trump? Well, the author makes fun of Trump’s technological skills (no proof), brings up unproven, debunked Russian gate and spends way too much time holding Trump to a standard that apparently only applies to conservatives/Trump. The author sounds like another frustrated anti-Trump hater who gives Obama a pass for outrageous failings while trashing Trump. I think this is an important book. I am no partisan Trump fan. But the treatment of Trump compared to Obama is ridiculous. Eight years - Obama did nothing. Gross negligence. Time for liberal authors to grow up.
3 people found this helpful
-
Overall
-
Performance
-
Story

- IanRobinson
- 12-07-19
Everyone should listen to this. It's exceptional.
We hear a lot about how state actors are using cybercrime techniques in order to influence opinion and attack infrastructure in other countries. But we rarely see a well-argued analysis that backs up this assertion. This book provides just such a well-argued analysis that outlines persuasively which organisations, and which country, were behind the devastating cyberattacks WannaCry, NotPetya, and others. And it outlines who is gaining malicious access to the control systems for the infrastructure that powers our modern world. Such as the electricity generation and supply systems, transport systems, communications and broadcast systems, and other industrial control systems. It also provides enough evidence to support the conclusion that the same, or closely associated, malicious actors were behind attempts to influence elections in Europe and the USA. Probably in other countries as well.
The case against the perpetrators, who are identified in the book, is built up logically and comprehensively. Everyone should read it and then draw their own conclusions. I know I have. One of the best books of 2019. Undoubtedly the best on cybersecurity. The audiobook version is very good indeed.
5 people found this helpful
-
Overall
-
Performance
-
Story

- Mr L J Bentley
- 08-02-20
A must for anyone in the cybersecurity arena
A must for anyone in the cybersecurity arena, excellent background and details to help understand the current situation.
4 people found this helpful
-
Overall
-
Performance
-
Story

- Mark Pack
- 05-03-20
Solid rather than entertaining
A really good overview with lots of fascinating detail. Despite the high drama of many of the events, this is more a solid description of them than something with the narrative drama of a well-written thriller.
2 people found this helpful
-
Overall
-
Performance
-
Story

- Woz
- 05-23-21
An interesting listen for anyone
I work in the IT industry and was recommended this book but told it would be if interest anyone, even without any technical background. To a large part, I agree, the level of information and research that has gone into writing this book is staggering. Far beyond the world of IT, the background on international conflict and competition paints a complete picture that is both disturbing and thought provoking. the narration too was spot on and dragged me into the book. I'll definitely be listening to this one again and wouldn't hesitate recommending it as a great listen.
1 person found this helpful
-
Overall
-
Performance
-
Story

- Stephen F.
- 03-09-21
Well worth a listen if you work in CyberSecurity
Great story as it described how some very large impacting security events unfolded, where they originated from and the drivers behind them.
This is an evolving space that will impact more and more people in the future.
1 person found this helpful
-
Overall
-
Performance
-
Story

- Rui Ribeiro
- 01-15-20
Highly recommended
A well written and very well narrated book on state sponsored hacking and cyber warfare, alerting readers for the already is a new reality, with cyber attacks against infrastructure and general unpreparedness for what that entails.
The subject is interesting, it's becoming ever more relevant, it is treated with knowledge and perspective and it is thus highly recommendable.
1 person found this helpful
-
Overall
-
Performance
-
Story

- Kindle Customer
- 08-05-22
Great Listen
Very interesting and in depth. Thoroughly enjoyed the political ties and the was a real eye opener how exposed our industries might
be!
-
Overall
-
Performance
-
Story

- P Browne
- 06-14-22
Repetitive and rather sterile
I really struggled with this one. The author does his best to inject excitement, but I found things pretty monotonous.
-
Overall
-
Performance
-
Story

- Erwin
- 06-08-22
Non fiction written like a fitxing book
The way this book is written makes you want to continue to read to know what's next. Multiple times, I've been wondering whether all of this has been real.
-
Overall
-
Performance
-
Story

- Amazon Customer
- 02-22-22
Thoroughly enjoyable book
Fantastic. Well read griping narrative from start to finish. Absolute "page turner" couldn't stop listening.
-
Overall
-
Performance
-
Story

- Nick
- 02-27-20
Really wanted to enjoy this
But struggled to get into it. Granted I'm a nerd and didn't need the introductions it kept on providing.
2 people found this helpful
-
Overall
-
Performance
-
Story

- Dion Fowles
- 04-07-21
Best cyber book by far
Andy Greenberg has written, what has been the most engaging and scary cyber book I have had in many years. Very well researched, balanced and easy to follow. The level of background information is balanced and provides enough information to really bring the book to life. This is not a dry cyber security book, this one will keep you awake at night..
1 person found this helpful
-
Overall
-
Performance
-
Story

- Jesse
- 04-22-22
Title.
An incredible true story and interesting take on cyber threats. A must read if you are interested in cyber security and crime.
-
Overall
-
Performance
-
Story

- Anonymous User
- 12-19-21
Outstanding
Quite different to what I had initially expected, without having much prior knowledge of the book content, besides being Cyber security related.
Fantastic narration, and will likely listen to it again in the coming year or two.
-
Overall
-
Performance
-
Story

- Amazon Customer
- 02-01-21
fantastic
great story depicting the great hack of the century.
Ukraine and not petya, governmental election's
-
Overall
-
Performance
-
Story

- Michael Coulson
- 11-24-20
The scariest book I've come across.
Compelling story with catestrophic consequences for the modern world.
Presents a strong argument for investment in digital security.
-
Overall
-
Performance
-
Story

- Bob
- 11-11-20
A good example
How IT keeps doing the same thing over and over expecting different results.
Hey guys! How about some diversity in your infrastructure
-
Overall
-
Performance
-
Story

- Amazon Customer
- 09-04-20
Engrossing,fantastic analysis of GRU operations
I absolutely loved, loved the way the orator tells the story. He captured the mood, the sentiment, and intention of the writer.
A lot of amazing facts to mentally highlight when working in this space. It reads true to a personal journal of an intelligence officer.
I simply couldn’t get enough of the inner workings of these state actors and how they operate. It left me longing for more readings of the same ilk.
Well worth the read for any that works in this space.
WELL DONE !