As soon as I noticed a book published with this savvy title this year, I knew I had to read it: Fancy Bear Goes Phishing: The Dark History of the Information Age, in five Extraordinary Hacks. In his youth, Scott J. Shapiro spent much time with computers, but later chose a career in philosophy and law. When writing about cyberwar, he returned to computers, re-learning programming and computer science. Attempting to answer the simple questions of why the Internet is insecure, how do hackers exploit insecurity and how they can be prevented, or at least decreased in numbers, Shapiro takes us on a journey with five stops, from the late 1980’s to the hacks of the Democratic National Committee and the Minecraft wars.
Tag: Cyberespionage
The debate on refugee espionage
Refugee espionage, according to Swedish law, is when a person unlawfully, secretly and systematically, over time, gathers information about someone else in order to provide a foreign power this information. It’s been part of Swedish law since the 1940’s and Sweden is one of the few countries to actually prohibit this action. How does the Swedish parliament and media debate refugee espionage since 2014, when the law was revised?
Book review: How to lose the information war
Nina Jankowicz’s second book is focused on Central and Eastern Europe and, as the title implies, information warfare, directed by Russia.
Book review: Click here to kill everybody
For those who don’t know of Bruce Schneier, he’s one of the world’s most famous and prominent cybersecurity experts. If there’s one person you’d like to guide you and hold your hand while in need, Schneier is the one. This book is about basics of cybersecurity, not the technical aspects, but rather about security on the Internet and the Internet+, the interconnected world of the Internet of things.
Time to decide again
It’s been two years and finally it’s time to study some more. In roughly one month, we’ll begin writing our bachelor thesis.
Book review: Reset
The director of the famous Citizen Lab has written about the state of the (tech) world and solutions to the crisis of democracy and tech. If there’s one book to rule them all, this is the one.
Book review: The Perfect Weapon
“The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb” it says on the back cover, and Sanger dives into cyberweapons and their implications on national and international security.
Book review: This is how they tell me the world ends
What is a zero-day? You may have heard news involving zero-days or zero-day exploits without actually reading those words, or you actually have read about zero-days, such as the Pegasus Project and the NSO Group? Nicole Perlroth is an American journalist focused on cybersecurity and digital espionage and did recently release her first book, This is how they tell me the world ends.