WINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021 The instant New York Times bestseller A Financial Times and The Times Book of the Year 'A terrifying expose' The Times 'Part John le Carre . . . Spellbinding' New Yorker We plug in anything we can to the internet. We can control our entire lives, economy and grid via a remote web control. But over the past decade, as this transformation took place, we never paused to think that we were also creating the world's largest attack su...
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy. “Both a real-life, tension-packed thriller and a persuasive argument for traditional intelligence work in the information age.”—Bruce Schneier, New York Times bestselling author of Data and Goliath and Click Here to Kill Everybody Eric O’Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover...
Scattered across the world, an elite team of code-cracking techies is working tirelessly on your behalf to thwart the most notorious cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, especially if its cybersecurity is imperfect, chances are that you’re painfully familiar with the group’s sworn enemy: ransomware. Again and again, these ordinary people, mostly self-taught and often struggling to make end...
The true story behind the BBC documentary Confessions of a Teenage Fraudster 'The crime of fraud, when conducted well, is a fascinating pursuit. It’s a test of intellect, determination and stamina. It is a floating mess of fact and fiction that you have to carry in your mind for twenty-four hours a day. It can be used to realize dreams, to slip on any mask required.’ Elliot Castro was just a teenager when he began to use his formidable intelligence and charm to swindle millions from the credit...
From the award-winning author of Sandworm comes the propulsive story of a new breed of investigators who have cracked the Bitcoin blockchain, exposing once-anonymous realms of money, drugs, and violence. “I love the book… It reads like a thriller… These stories are amazing.” (Michael Lewis) Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing,...
Handbook of Research on Advancing Cybersecurity for Digital Transformation
Cybersecurity has been gaining serious attention and recently has become an important topic of concern for organizations, government institutions, and largely for people interacting with digital online systems. As many individual and organizational activities continue to grow and are conducted in the digital environment, new vulnerabilities have arisen which have led to cybersecurity threats. The nature, source, reasons, and sophistication for cyberattacks are not clearly known or understood, an...
A historic institution is hiding a very modern threat.The studentLi Min, a Chinese student, is forced by her government to transfer from Harvard to Oxford University, where she is recruited to an elite Chinese study centre based out of St Felix’s College. The scapegoatMeanwhile, the centre’s newly recruited head stumbles on its more sinister purpose: recruiting Chinese and sympathetic British students to steal high-value research and intellectual property. Unsure who at the university he can tru...
A Cryptographic Model for Cyber Security Applications
by Subodh Kumar
On 5 June 2013, the Guardian began publishing a series of documents leaked by NSA contractor Edward Snowden, revealing the extent of internet surveillance undertaken by government and intelligence agencies. It provoked an immediate outcry. ‘I didn’t want to change society,’ Snowden would later say, in exile. ‘I wanted to give society a chance to determine if it should change itself.’ And to some extent, he has. Snowden’s leaks have provoked important debates about the precarious balance between...
When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats. Hacked offers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target....
With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become...
Named a "Favorite Book of 2022" by the Washington Independent Review of Books The Winning Ticket is an inside look at one of the most complicated yet seat-of-your-pants financial investigations and prosecutions in recent history. Rob Sand, the youngest attorney in his office, was assigned a new case by his boss, who was days away from retirement. Inside the thin accordion binder Sand received was meager evidence that had been gathered over the course of two years by Iowa authorities regarding a...