Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global

Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global

  • Downloads:4271
  • Type:Epub+TxT+PDF+Mobi
  • Create Date:2021-07-20 16:16:04
  • Update Date:2025-09-23
  • Status:finish
  • Author:Geoff White
  • ISBN:1789144434
  • Environment:PC/Android/iPhone/iPad/Kindle

Summary

From Anonymous to the Dark Web, a dizzying account of hacking—past, present, and future。

“Brilliantly researched and written。”—Jon Snow, Channel 4 News

 
“A comprehensive and intelligible account of the elusive world of hacking and cybercrime over the last two decades。 。 。 。 Lively, insightful, and, often, alarming。”—Ewen MacAskill, Guardian

On May 4, 2000, an email that read “kindly check the attached LOVELETTER” was sent from a computer in the Philippines。 Attached was a virus, the Love Bug, and within days it had been circulated across the globe, paralyzing banks, broadcasters, and businesses in its wake, and extending as far as the UK Parliament and, reportedly, the Pentagon。 The outbreak presaged a new era of online mayhem: the age of Crime Dot Com。 In this book, investigative journalist Geoff White charts the astonishing development of hacking, from its conception in the United States’ hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as one of the most dangerous and pervasive threats to our connected world。 He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks to make millions are being harnessed by nation states to target voters, cripple power networks, and even prepare for cyber-war。 From Anonymous to the Dark Web, Ashley Madison to election rigging, Crime Dot Com is a thrilling, dizzying, and terrifying account of hacking, past and present, what the future has in store, and how we might protect ourselves from it。

Download

Reviews

Pistachio

A book that will take you through cybercrime history and some of most influential hacks。 It is not going to be deep, but it is quite nice journalistic overview of the area。If you work in this area, you might find out more by yourself or perhaps you know most of those stories already。 But still, it was quite fine reading。And I loved this one (a tiny part of the book): "They managed to reverse-engineer the link to reveal a list of all the other people targeted by the hackers。 It was, they said, a A book that will take you through cybercrime history and some of most influential hacks。 It is not going to be deep, but it is quite nice journalistic overview of the area。If you work in this area, you might find out more by yourself or perhaps you know most of those stories already。 But still, it was quite fine reading。And I loved this one (a tiny part of the book): "They managed to reverse-engineer the link to reveal a list of all the other people targeted by the hackers。 It was, they said, a who's who of anti-Russian interests, 。。。 。 What's more, the links had all been created between 9AM and 5PM, Moscow time, between Monday and Friday - with one day off, which happened to coincide with a holiday for technical military staff in the Russian Federation。" 。。。more

Sean Perry

I finished this at 4:30 in the morning, and immediately had the thought I should get up and change all, and I mean all, my passwords。 Scary stuff。

Madalene

Quite dry, but informative - particularly in identifying the types of people behind many of the hacks in the last twenty years you have heard about。 Helpful description of the common "I am with customer service - please check your computer for this file and if it appears, your computer is infected" scam and how it came to be; and tips at the end for what might head off the devastating social engineering hacks that most corporations fear and often experience。 Quite dry, but informative - particularly in identifying the types of people behind many of the hacks in the last twenty years you have heard about。 Helpful description of the common "I am with customer service - please check your computer for this file and if it appears, your computer is infected" scam and how it came to be; and tips at the end for what might head off the devastating social engineering hacks that most corporations fear and often experience。 。。。more

Feed The Crime

Cyber Crime is a topic that I’m extremely interested in, I don’t know what it is but I love the dark side of technology and what people will do under the cover of anonymity。 I have read quite a bit on this topic so I was a little worried that there wouldn’t be much new to me in here。However there was no need to worry as Geoff White gave me everything that I was looking for and more!You can read my full review here: https://feedthecrime。wordpress。com/20。。。 Cyber Crime is a topic that I’m extremely interested in, I don’t know what it is but I love the dark side of technology and what people will do under the cover of anonymity。 I have read quite a bit on this topic so I was a little worried that there wouldn’t be much new to me in here。However there was no need to worry as Geoff White gave me everything that I was looking for and more!You can read my full review here: https://feedthecrime。wordpress。com/20。。。 。。。more

Geoff

My Recommendation: Between this and Rachel Maddow's  Blowout, I'm debating going off grid and living like I'm in the 1800s—this shit is scary and slightly overwhelming when faced collectively。 White does an excellent job of highlighting the last 30 years of cyber (enabled) crime, all while keeping the individuals (and governments) who perpetrated it and suffered from it at the center of his narrative。 He doesn't give you everything and is upfront about that, but he does gives you the unvarnis My Recommendation: Between this and Rachel Maddow's  Blowout, I'm debating going off grid and living like I'm in the 1800s—this shit is scary and slightly overwhelming when faced collectively。 White does an excellent job of highlighting the last 30 years of cyber (enabled) crime, all while keeping the individuals (and governments) who perpetrated it and suffered from it at the center of his narrative。 He doesn't give you everything and is upfront about that, but he does gives you the unvarnished truth without scaring you too much。 But let's face it, this book gives you enough knowledge to want to seek out more so you can keep you and yours safe as society continues venturing forth into the vast unknown that is the cyberage we live in。 This is definitely worth the read!My Response: I honestly don't know how people exist without being paranoid ALL THE TIME。 When I first said yes to this after the publicist reached out, it was like 95% because the author's first name was Geoff and 5% because the subject was interesting。 And then I found myself completely absorbed with this book。*Now I'm not saying we're totally screwed, but I mean we're not really that far from being totally screwed and White does a really good job of explaining all of it。 He takes an in depth look at the start of cybercrime with the quaint "Love Bug" virus (Wikipedia) to the state sponsored hacking/cyber assault that nudged us into the rotting cesspool of Trumpism that is the US right now。Continue reading on my book blog at geoffwhaley。com。 。。。more