Details

If It's Smart, It's Vulnerable


If It's Smart, It's Vulnerable


1. Aufl.

von: Mikko Hypponen

18,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 22.06.2022
ISBN/EAN: 9781119895190
Sprache: englisch
Anzahl Seiten: 288

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Reimagine the future of the internet</b> <p>All our devices and gadgets—from our refrigerators to our home security systems, vacuum cleaners, and stereos—are going online, just like our computers did. But once we’ve successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? <p>In <i>If It’s Smart, It’s Vulnerable</i>, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more. <p>Readers will also find: <ul> <li>Insightful discussions of how law enforcement and intelligence agencies operate on the internet</li> <li>Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology</li> <li>Explorations of how the internet has changed the world, for better and for worse</li> <li>Engaging stories from Mikko's 30-year career in infosec</li></ul><p>Perfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, <i>If It’s Smart, It’s Vulnerable</i> will also earn a place in the libraries of anyone interested in the future of the internet.
<p>Foreword: Jeff Moss xiii</p> <p>Preface xvii</p> <p>Saab 9000 Turbo xxi</p> <p>The Good and the Bad of the Internet 1</p> <p>Prehistoric Internet 2</p> <p>The First Websites 5</p> <p>Linux Is the World’s Most Important System 7</p> <p>iPhone vs. Supercomputer 10</p> <p>Online Communities 11</p> <p>Money Is Data 13</p> <p>Codes All Around Us 14</p> <p>Geopolitics 17</p> <p>Security Tetris 21</p> <p>Who Are We Fighting? 24</p> <p>Schoolboys 24</p> <p>Spammer 26</p> <p>Professional Cybercrime Groups 28</p> <p>Extremists 29</p> <p>The Rolex 30</p> <p>Malware—Then, Now, and in the Near Future 33</p> <p>The History of Malware 34</p> <p>Viruses on Floppies 34</p> <p>Brain.A 35</p> <p>File Viruses 43</p> <p>Macro Viruses 43</p> <p>Email Worms 45</p> <p>Internet Worms 46</p> <p>The Virus Wars 49</p> <p>Web Attacks 51</p> <p>Mobile Phone Viruses 51</p> <p>Worms on Social Media 54</p> <p>Smartphones and Malware 55</p> <p>Law Enforcement Malware 57</p> <p>Case R2D2 58</p> <p>Cracking Passwords 59</p> <p>When a Hacker Spilled Her Coffee 60</p> <p>Ransomware Trojans 61</p> <p>The History of Ransomware Trojans 61</p> <p>Cryptolocker 64</p> <p>Honest Criminals 65</p> <p>Notpetya 65</p> <p>Case Maersk 67</p> <p>Wannacry 71</p> <p>My Week with Wannacry 72</p> <p>Targeted Ransomware Trojans 76</p> <p>Ransomware Trojans v2 77</p> <p>The Human Element 79</p> <p>The Two Problems 80</p> <p>The Heist 82</p> <p>CEO Fraud 89</p> <p>Touring the Headquarters 92</p> <p>Protecting Company Networks 95</p> <p>Zero Trust 100</p> <p>Bug Bounties 101</p> <p>Wi- Fi Terms of Use 110</p> <p>Mikko’s Tips 112</p> <p>Mikko’s Tips for the Startup Entrepreneur 114</p> <p>Boat for Sale 118</p> <p>What If the Network Goes Down? 121</p> <p>Electrical Networks 122</p> <p>Security in Factories 124</p> <p>A Search Engine for Computers 126</p> <p>Slammer 128</p> <p>Hypponen’s Law 130</p> <p>Dumb Devices 132</p> <p>Regulation 134</p> <p>Car Software Updates 136</p> <p>Online Privacy 137</p> <p>Life Without Google 138</p> <p>Murder Charges Never Expire 139</p> <p>Is Google Listening to You? 142</p> <p>Gorillas 143</p> <p>Startup Business Logic 145</p> <p>Biometrics 147</p> <p>Antisocial Media 149</p> <p>Online Influencing and Elections 151</p> <p>Privacy Is Dead 153</p> <p>Before and After Gmail 156</p> <p>Encryption Techniques 160</p> <p>Perfect Encryption 160</p> <p>Unbreakable Encryption 161</p> <p>Criminal Use of Encryption Systems 162</p> <p>Data Is The New Uranium 166</p> <p>CASE Vastaamo 168</p> <p>Patient Registry 169</p> <p>Technologies 170</p> <p>Vastaamo.tar 171</p> <p>Extortion Messages 173</p> <p>The Hunt for the TAR File 175</p> <p>Innocent Victims 177</p> <p>Cryptocurrencies 179</p> <p>The Value of Money 180</p> <p>Blockchains 181</p> <p>Blockchain Applications 182</p> <p>Blockchains and Money 183</p> <p>The Environmental Impacts of Bitcoin 185</p> <p>Playing the Market 187</p> <p>Ethereum, Monero, and Zcash 189</p> <p>Nft 191</p> <p>Bitcoin and Crime 193</p> <p>Border Guards vs. Bitcoin 195</p> <p>Technology, Espionage, and Warfare Online 199</p> <p>Cyberweapons 200</p> <p>Lunch Break at Google 201</p> <p>Technology and Warfare 202</p> <p>Under a False Flag 204</p> <p>Concealability of Cyberweapons 205</p> <p>The Fog of Cyberwar 207</p> <p>Case Prykarpattyaoblenergo 211</p> <p>Case Pyeongchang 213</p> <p>Governments as Malware Authors 214</p> <p>Russia and China 216</p> <p>Case Stuxnet 217</p> <p>Damage Coverage 226</p> <p>Explosion at the White House 227</p> <p>My Boycott of RSA, Inc 229</p> <p>The Future 233</p> <p>Artificial Intelligence 234</p> <p>Wolverines 237</p> <p>AI Will Take Our Jobs 238</p> <p>Smart Malware 239</p> <p>Metaverse 240</p> <p>The Technology of Warfare 241</p> <p>“You Are Under Arrest for a Future Murder” 242</p> <p>Those Who Can Adapt Will Prosper 243</p> <p>Tesla 245</p> <p>Trends in Technology 247</p> <p>Coda 249</p> <p>Index 251</p>
<p><b>MIKKO HYPPONEN</b> is a global cyber security expert with over thirty years’ experience working as a researcher and investigator. He is a sought-after lecturer, and he was profiled in <i>Vanity Fair</i>. His TED Talk has been viewed more than 2 million times.</p>
<p><b>PRAISE FOR<br /><i>IF IT’S SMART, IT’S VULNERABLE</i></b></p> <p>“As we rush forward with an insatiable desire to connect everything, Mikko shines a light on the risks we accept yet often fail to understand…until it’s too late.”<br /><b>—TROY HUNT,</b> founder of Have I Been Pwned</p> <p>“<i>If It’s Smart, It’s Vulnerable</i> is not just a book for techies and hackers. The stories and examples make it accessible to anyone!”<br /><b>—KEREN ELAZARI,</b> friendly hacker and a TED speaker</p> <p>“Mikko has a remarkably lucid understanding of cyber security and the history of the Internet. You’ll come away with an appreciation of the major problems and the high stakes that come with any attempt to keep our networks and systems secure.” <br /><b>—JACK RHYSIDER,</b> Creator of the Darknet Diaries podcast</p> <p>“A breezy survey of cybersecurity from one of the pillars of our industry. There’s not a lot that Mikko hasn’t seen.”<br /><b>—EVA GALPERIN,</b> Director of Cybersecurity, Electronic Frontier Foundation</p> <p>“Surprisingly up to date account of the vulnerable world we live in! Mikko is a natural storyteller who draws you into his world.”<br /><b>—CHARLIE MILLER,</b> Computer Security Researcher</p> <p>“There is nobody out there that is more knowledgeable when it comes to cyber threats in the modern world. Mikko has taken his knowledge and captured it in this book in a fascinating way, making this a must read.”<br /><b>—AKI ANASTASIOU,</b> talk radio host</p>
<p>"What makes him stand out is that, although he is a master coder and cyber security engineer, he is a superb communicator."<br /><b><b>—</b>Misha Glenny, <i>Financial Times</i></b></p> <p>"An excellent and engaging survey of cybersecurity..."<br /><b><b>—</b>Kristie Lu Stout, CNN anchor and correspondent<i><br /><br /></i></b>“Mikko Hypponen's <i>If It's Smart, It's Vulnerable</i> is a fascinating and engaging tour of the past, present, and likely future of cybersecurity by an expert who's spent three decades at the front lines of the global war against malware. Technical and non-technical readers alike will find Hypponen's personal anecdotes informative and highly entertaining as he explores the evolution of the systems that power modern society—along with the risks and rewards they present to us all. Highly recommended.” <br /><b>—Daniel Suarez, <i>New York Times</i> bestselling author of <i>Daemon</i></b></p> <p>“<i>If It’s Smart, It’s Vulnerable</i> is not just a book for techies and hackers. The stories and examples make it accessible to anyone!” <br /><b>—Keren Elazari, friendly hacker and a TED speaker</b></p> <p>“As the namesake of Hypponen’s law, Mikko is the right person to explain how everything is getting connected, and what we should do to secure all devices on the internet — both the smart ones and the stupid ones.” <br /><b>—Robert M. Lee, founder and CEO of Dragos Inc.</b></p> <p>“As we rush forward with an insatiable desire to connect everything, Mikko shines a light on the risks we accept yet often fail to understand...until it’s too late.” <br /><b>—Troy Hunt, founder of Have I Been Pwned</b></p> <p>“Mikko has a remarkably lucid understanding of cyber security and the history of the Internet. You’ll come away with an appreciation of the major problems and the high stakes that come with any attempt to keep our networks and systems secure.” <br /><b>—Jack Rhysider, Creator of the <i>Darknet Diaries</i> podcast</b></p> <p>“A breezy survey of cybersecurity from one of the pillars of our industry. There’s not a lot that Mikko hasn’t seen.”<br /><b>—Eva Galperin, Director of Cybersecurity, Electronic Frontier Foundation</b></p> <p>“A guided tour of the intersection between security and technology by the best kind of storyteller. Mikko lived it, shaped it, and now explains it.” <br /><b>—John Lambert, Microsoft</b></p> <p>“Hypponen has seen a lot in his more than 30-year career in information security. There is much to learn from what he shares and has witnessed. He is a great writer, and if you are smart, you will read this book.”<br /><b><b><b>—</b></b>Ben Rothke, Tapad</b></p> <p>“It's hard to understand a revolution when we are living in the middle of it. Mikko clearly explains the technology megatrends shaping our future and illustrates his points with fascinating real-world stories from his long career in infosec.” <br /><b>—Dave DeWalt, Founder of NightDragon and former CEO of McAfee and FireEye/Mandiant</b></p> <p>“Surprisingly up to date account of the vulnerable world we live in! Mikko is a natural storyteller who draws you into his world.” <br /><b>—Charlie Miller, Computer Security Researcher</b></p> <p>“Mikko uses his remarkable experience to give the reader an understanding of the challenges we as digital citizens face. <i>If It's Smart, It’s Vulnerable</i>; no truer words have been said in this digital age.” <br /><b>—Raj Samani, Senior Vice President and Chief Scientist at Rapid7</b></p> <p>“There is nobody out there that is more knowledgeable when it comes to cyber threats in the modern world. Mikko has taken his knowledge and captured it in this book in a fascinating way, making this a must read.” <br /><b>—Aki Anastasiou, talk radio host</b></p> <p>“Before the internet, people were not used to reality having multiple dimensions. Now that the globe is being connected at an exponential pace, we are lucky to have talented guys like Mikko Hypponen explain how we can move to the next step.” <br /><b>—Marcelo Tas, Brazilian actor, author and TV host</b></p>

Diese Produkte könnten Sie auch interessieren:

Intelligent Systems for Rehabilitation Engineering
Intelligent Systems for Rehabilitation Engineering
von: Roshani Raut, Pranav Pathak, Sandeep Kautish, Pradeep N.
EPUB ebook
190,99 €
Cyber Security and Digital Forensics
Cyber Security and Digital Forensics
von: Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le
PDF ebook
190,99 €
Smart Systems for Industrial Applications
Smart Systems for Industrial Applications
von: C. Venkatesh, N. Rengarajan, P. Ponmurugan, S. Balamurugan
EPUB ebook
190,99 €