Listen free for 30 days
-
Cyber Wars
- Hacks That Shocked the Business World
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged Audiobook
- Categories: Business & Careers, Management & Leadership
Add to basket failed.
Add to wishlist failed.
Remove from wishlist failed.
Follow podcast failed
Unfollow podcast failed
Listen with a free trial
Buy Now for £14.99
No valid payment method on file.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
The Tragedy of Great Power Politics
- By: John J. Mearsheimer
- Narrated by: Mark Ashby
- Length: 16 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
A decade after the cold war ended, policy makers and academics foresaw a new era of peace and prosperity, an era in which democracy and open trade would herald the "end of history." The terrorist attacks of September 11, 2001, sadly shattered these idyllic illusions, and John Mearsheimer's masterful new book explains why these harmonious visions remain utopian.
-
-
The best modern explanation of Real Politik
- By Adrian J. Smith on 19-06-19
-
Hacked Again
- By: Scott N. Schober
- Narrated by: John Pruden
- Length: 3 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
-
Digital Wars
- Apple, Google, Microsoft, and the Battle for the Internet
- By: Charles Arthur
- Narrated by: Stephen Rashbrook
- Length: 11 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Digital Wars starts in 1998, when the Internet and computing business was about to be upended - by an antitrust case, a tiny start-up and a former giant rebuilding it. Charles Arthur here examines the differing strategies of the three best-known tech companies in their battle to win control of the exploding network connecting the world. Microsoft was a giant - soon to become the highest-valued company in the world - while Apple was a minnow and Google just a start-up. By February 2012, Apple was worth more than both Microsoft and Google combined.
-
-
Fascinating
- By Lee on 30-06-13
-
Prediction Machines
- The Simple Economics of Artificial Intelligence
- By: Ajay Agrawal, Joshua Gans, Avi Goldfarb
- Narrated by: LJ Ganser
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence does the seemingly impossible - driving cars, trading stocks, and teaching children. But facing the sea change that AI will bring can be paralyzing. How should companies set strategies, governments design policies, and people plan their lives for a world so different from what we know? In Prediction Machines, three eminent economists recast the rise of AI as a drop in the cost of prediction. With this single, masterful stroke, they lift the curtain on the AI-is-magic hype and show how basic tools from economics provide clarity about the AI revolution and a basis for action by CEOs, managers, policy makers, investors, and entrepreneurs.
-
-
A realistic look at Machine Learning and AI
- By Open Mind on 17-10-18
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it. In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen.
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
Fascinating book
- By Richard Alberg on 06-07-20
-
The Tragedy of Great Power Politics
- By: John J. Mearsheimer
- Narrated by: Mark Ashby
- Length: 16 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
A decade after the cold war ended, policy makers and academics foresaw a new era of peace and prosperity, an era in which democracy and open trade would herald the "end of history." The terrorist attacks of September 11, 2001, sadly shattered these idyllic illusions, and John Mearsheimer's masterful new book explains why these harmonious visions remain utopian.
-
-
The best modern explanation of Real Politik
- By Adrian J. Smith on 19-06-19
-
Hacked Again
- By: Scott N. Schober
- Narrated by: John Pruden
- Length: 3 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
-
Digital Wars
- Apple, Google, Microsoft, and the Battle for the Internet
- By: Charles Arthur
- Narrated by: Stephen Rashbrook
- Length: 11 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Digital Wars starts in 1998, when the Internet and computing business was about to be upended - by an antitrust case, a tiny start-up and a former giant rebuilding it. Charles Arthur here examines the differing strategies of the three best-known tech companies in their battle to win control of the exploding network connecting the world. Microsoft was a giant - soon to become the highest-valued company in the world - while Apple was a minnow and Google just a start-up. By February 2012, Apple was worth more than both Microsoft and Google combined.
-
-
Fascinating
- By Lee on 30-06-13
-
Prediction Machines
- The Simple Economics of Artificial Intelligence
- By: Ajay Agrawal, Joshua Gans, Avi Goldfarb
- Narrated by: LJ Ganser
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence does the seemingly impossible - driving cars, trading stocks, and teaching children. But facing the sea change that AI will bring can be paralyzing. How should companies set strategies, governments design policies, and people plan their lives for a world so different from what we know? In Prediction Machines, three eminent economists recast the rise of AI as a drop in the cost of prediction. With this single, masterful stroke, they lift the curtain on the AI-is-magic hype and show how basic tools from economics provide clarity about the AI revolution and a basis for action by CEOs, managers, policy makers, investors, and entrepreneurs.
-
-
A realistic look at Machine Learning and AI
- By Open Mind on 17-10-18
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it. In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen.
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
Fascinating book
- By Richard Alberg on 06-07-20
-
Social Warming
- The Dangerous and Polarising Effects of Social Media
- By: Charles Arthur
- Narrated by: Charles Arthur
- Length: 10 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
Nobody meant for this to happen. Facebook didn't mean to facilitate a genocide. Twitter didn't want to be used to harass women. YouTube never planned to radicalise young men. But with billions of users, these platforms need only tweak their algorithms to generate more 'engagement'. In so doing, they bring unrest to previously settled communities and erode our relationships. Social warming has happened gradually - as a by-product of our preposterously convenient digital existence.
-
-
Very Informative
- By Amazon Customer on 04-08-21
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.
-
-
Fascinating subject and an amazing story
- By Just little old me on 01-04-15
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
Gripping
- By MR on 15-06-12
-
Listening In
- Cybersecurity in an Insecure Age
- By: Susan Landau
- Narrated by: Tamara Marston
- Length: 6 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity - and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un.
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Fascinating History of Hacking
- By James on 19-07-19
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
A brilliant story of computer history
- By Matt on 26-06-16
-
Crime Dot Com
- From Viruses to Vote Rigging, How Hacking Went Global
- By: Geoff White
- Narrated by: Geoff White
- Length: 10 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Geoff White charts the astonishing development of hacking, from its birth among the ruins of the Eastern Bloc to its coming of age as the most pervasive threat to our connected world. He takes us inside the workings of real-life cybercrimes, revealing how the tactics of high-tech crooks are now being harnessed by nation states. From Ashley Madison to election rigging, Crime Dot Com is a thrilling account of hacking, past and present, and of what the future might hold.
-
-
Extremely insightful
- By Conor J Gilmartin on 22-02-22
-
Parliament Ltd
- A journey to the dark heart of British politics
- By: Martin Williams
- Narrated by: Esther Wane, Luke Thompson
- Length: 9 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Parliament Ltd, investigative journalist Martin Williams reveals the true extent of greed and corruption in Westminster. Containing explosive new revelations about the activities of those at the top, this is a shocking untold tale that goes to the rotten heart of British politics.
-
-
painfully exposing the Parliament
- By Amazon Customer on 03-09-16
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break in and scamper through the world’s computer networks invisibly until discovered. One of the most coveted tools in a spy's arsenal, a zero day has the power to tap into any iPhone, dismantle safety controls at a chemical plant and shut down the power in an entire nation - just ask the Ukraine. Zero days are the blood diamonds of the security trade, pursued by nation states, defence contractors, cybercriminals and security defenders alike. In this market, governments aren’t regulators; they are clients.
-
-
I still don't know how the world ends
- By Kittihawk on 27-07-21
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Great story but iffy presentation at times.
- By B A CRANCH on 16-07-20
-
Moneyland
- Why Thieves and Crooks Now Rule the World and How to Take It Back
- By: Oliver Bullough
- Narrated by: Oliver Bullough
- Length: 9 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
From ruined towns on the edge of Siberia to Bond-villain lairs in Knightsbridge and Manhattan, something has gone wrong with the workings of the world. Once upon a time, if an official stole money, there wasn't much he could do with it. He could buy himself a new car or build himself a nice house or give it to his friends and family, but that was about it. If he kept stealing, the money would just pile up in his house until he had no rooms left to put it in, or it was eaten by mice. And then some bankers in London had a bright idea.
-
-
Fascinating investigation
- By M. Gallagher on 10-05-19
-
The Great Delusion
- Liberal Dreams and International Realities
- By: John J. Mearsheimer
- Narrated by: Noah Michael Levine
- Length: 9 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this major statement, the renowned international-relations scholar John Mearsheimer argues that liberal hegemony, the foreign policy pursued by the United States since the Cold War ended, is doomed to fail. It makes far more sense, he maintains, for Washington to adopt a more restrained foreign policy based on a sound understanding of how nationalism and realism constrain great powers abroad.
-
-
Solid and convincing argument
- By Adrian J. Smith on 11-12-19
Summary
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented.
Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work and how hackers think as well as giving invaluable advice on staying vigilant and avoiding the security mistakes and oversights that can lead to downfall. No organisation is safe, but by understanding the context within which we now live and what the hacks of the future might look like, you can minimise the threat.
In Cyber Wars, you will learn how hackers in a TK Maxx parking lot managed to steal 94m credit card details, costing the organization $1bn; how a 17-year-old leaked the data of 157,000 TalkTalk customers, causing a reputational disaster; how Mirai can infect companies' Internet of Things devices and let hackers control them; how a sophisticated malware attack on Sony caused corporate embarrassment and company-wide shut down; and how a phishing attack on Clinton Campaign Chairman John Podesta's email affected the outcome of the 2016 US election.
More from the same
Author
What listeners say about Cyber Wars
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Rob
- 02-02-19
Ok for those with 0 knowledge but avoid if techie
My review is slightly harsh. Coming from a technical background I found the information here not particularly interesting or already covered better elsewhere. If you are from a none technical background and in business however, this book could be pretty good as everything is laid out cleanly and easily with lessons to be learnt.
7 people found this helpful
-
Overall
-
Performance
-
Story
- Dr V
- 09-09-18
Well researched and written
I rarely write reviews but I appreciated this book and wanted to recommend it to others. Written as a series of stories of different exploits it is a fascinating insight.
5 people found this helpful
-
Overall
-
Performance
-
Story
- Pusateri
- 16-01-19
Topical and interesting
A narrator with a good voice and delivery was a bonus to these tales of computer hacking. Thoroughly enjoyed it and made me more aware of the dangers in cyberspace. Recommended for those with even a peripheral interest in this area.
4 people found this helpful
-
Overall
-
Performance
-
Story
- Luis1989
- 07-01-19
Very good
Very interesting and very well explained without technical jargon. Easy to follow and well written
3 people found this helpful
-
Overall
-
Performance
-
Story
- Stephen
- 08-03-20
Excellent overview of interesting hacks
Easy to listen to, and suitable for technical and non technical, the book is well written and quite comprehensive on the hacks that are discussed. Each chapter ends with some good advice for all people using the Internet, not just those in Business.
2 people found this helpful
-
Overall
-
Performance
-
Story
- THE.CAPTAIN.1962
- 09-12-19
Cyberscary
A real eye opener..... Amazing how many internet enabled devices other than computers could be exploited.
1 person found this helpful
-
Overall
-
Performance
-
Story
- mr p garrett
- 31-01-19
accessible explanation of a complex topic
the writer picks a few key hacks and does a really good job of using them to explore some of the broader aspects and vulnerabilities organisations have.
the examples were current, in depth and bring a light of a range of hacking techniques. I think again before buying any internet of things device.
The narrater was clear conversational and not as stuffy as some I have heard
1 person found this helpful
-
Overall
-
Performance
-
Story
- Samuele M.
- 11-07-21
Excellent
there is enough balance between high level technical explanations and facts, and the reader is excellent!!
-
Overall
-
Performance
-
Story
- Amazon Customer
- 10-06-21
Eye opener
I'm a tech startup founder and this book had made me take cyber security very seriously.
It's so important yet so neglected. A great listen and well narrated
-
Overall
-
Performance
-
Story
- Amazon Customer
- 19-04-21
Perfect 2 for 1
I got it in a 2 for 1 sale. Wouldn't have bought usually because of the short length.
The narrator is great. I'd have a drink with the lad, no pomp or owt which makes the book better.
The book itself needs a revision. I might be coming to it late but no Stuxnet? It also felt like the first 2 stories were the best then there was trailing off.
I'd love to gift it to my manager (directing) to argue points but it's too dry for general viewing and not technical enough to show to a friend. Great though and would highly recommend
-
Overall
-
Performance
-
Story

- Quella
- 11-01-19
For the security professional and average joe
“Cyber Wars” subtitled “Hacks That Shocked the Business World” is the second book written by Charles Arthur available on Audible in audiobook format. His previous work titled “Digital Wars: Apple, Google, Microsoft, and the Battle for the Internet” appears to have been well received and reviewed; I may have to give that one a listen as well. The Audiobook edition of this book is well narrated by Joe Jameson who has over a hundred books currently narrated on audible at the time of this review. Let me start by saying that I have been in the information security field for over thirty years and I continue to fight the cat and mouse game alongside other when it comes to attackers vs. defenders. Most of the attacks covered in this book were front and center not only in the security community but on the front cover of most newspapers as well. Even if you are not a professional having a deep understanding of computer security, I think you will be fascinated by the research uncovered in this book. It still amazes me when I see just what dedicated and driven people will do when they put their minds to it. The author does a decent job of breaking down some of the technology for novices, but he also does not lose the seasoned professional. It is a fine line to walk, and this book did an exceptional job of permitting both types to enjoy it equally.
Overall the book felt well researched and presented in the clear manner. Each of the various attacks were outlined and then the author provides a deeper dive in to what happened. Much of the books research appears to have come from the author interviewing or conversing with people who were in the know for a given attack; either ex-workers, people in the security field, etc. For me, I was not as much a fan of the lessons learned section at the end of each chapter. However, some reading this book might gain from this information and hopefully think about or improve their security posture because of it. I just felt that security advice is often easier when we look back and analyze what could have been done to prevent an attack. Reviewing an attack and learning from what went wrong is a major way of preventing future attacks from being successful, yet the details the author provided were often high-level and not specific to a given organization.
As much as the author tried to make the book work for security enthusiasts and lay people alike, there were a few places that I felt he could have provided more detail to the less experienced. Maybe a more information on what an Advanced Persistent Threat (APT) is and how many have names with specific animals assigned to them (bear, panda, dragon, etc.). A bit more time spent on the benefits of Multi-Factor Authentication (MFA). I felt overall, he did a good job of discussing what a Distributed Denial of Service (DDoS) attack is and why they can be so devastating to a company or person who depends on the Internet for a living. It also seemed that the author breezed over the importance of data brokers when it comes to protecting one’s information; think credit bureaus. More and more we are seeing the release of information from these data collection agencies and often there is no ramifications when it happens; the UKs GDPR is a positive direction here.
A few other areas where I thought the author did a good job was around the recent rise in tech support and bank phone scams. Ever had the “IRS” call you saying you owe them money and you have to pay them back using Google’s Play cards? He also touched on the critical nature of Internet of Things (IoT) and the usual tradeoffs between security and ez-of-use. Who or what is required to patch a device that is vulnerable to attack, and if such a device is used in an attack who is responsible? All very difficult questions to ask that will become even more important as this area of connectivity grows, and more lives are at risk. There was also a small chapter at the end of the book where the author covers future attacks. Here is not only talks about medical and IoT systems, but the idea of vulnerable machine learning systems. What if someone is able to teach an autonomous vehicle that a stop sign is really a go symbol. Or, what if humans are ignored from the equation and simply seen as just part of the pavement. These and many more attacks mentioned in this portion of the book will become the next TJ Maxx or Sony Entertainment.
The book’s audio narration was good. It is often difficult determining the performance quality based on one’s reading of a non-fiction book. We did not have multiple characters needing to be voiced, it was a simple reading of the book itself. Mr. Jameson did a good job of performing the piece and I do not recall any audio artifacts (page turns, swallows, background noise) while listening. The reading was well paced, and the volume levels were consistent. I do not recall listening to other works by this narrator previously, yet the book felt like it was performed by a professional.
Parents and younger readers, I do not have it in my notes, however I believe there were a few places when the author quotes others containing vulgar language. Apart from the infrequent use of profanity, the book could be enjoyed by younger audiences who are interested in the cyber security field.
In summary, if you are looking for a book that uncovers many of the security issues the plagued the early days of the internet and had a great impact on the companies effected, you have found it here in Cyber Wars. Even today, as attacks become more sophisticated, the means of defending them will be even more difficult. The book is not a Cyber Wars for Dummies, yet it is approachable and enjoyable by both those in the industry and not. The book gets a recommendation from me.
2 people found this helpful
-
Overall
-
Performance
-
Story

- Dee
- 02-05-21
Cyber security Class Text. Excellent Choice.
Very informative, updated, well researched and written. Loved the real life events of Cyber attacks and learning how they could've been avoided. Also interesting to note, a bunch of young men in late teens have some intelligent brains inventing hacks that literally changed the world. They need incentive to become White Hats, altho Gonzalez failed in that and succumbed to his greed & is still locked up. Excellent book! Thank to my Prof Smith for picking a recent book thats available on Audible. So much easier and faster than reading. 👏🏽
-
Overall
-
Performance
-
Story

- J. Lee
- 27-08-20
Should be named Cyber Attacks.
I was hoping when I purchased this book that it would be about the many actual state sponsored attacks that have occurred. Instead it was just kind of a history of hacks most people know. It did go into a little detail that made it interesting, but for the most part it barely skimmed across many historical Cyber wars that almost bankrupted certain countries in the baltics.