Unavailable
Unavailable
Unavailable
Ebook257 pages4 hours
Worm: The First Digital World War
By Mark Bowden
Rating: 3 out of 5 stars
3/5
()
Currently unavailable
Currently unavailable
About this ebook
From the author of Black Hawk Down comes the story of the battle between those determined to exploit the internet and those committed to protect itthe ongoing war taking place literally beneath our fingertips.
The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.
The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.
Unavailable
Author
Mark Bowden
Mark Bowden is the author of Road Work, Finders Keepers, Killing Pablo, Black Hawk Down (nominated for a National Book Award), Bringing the Heat, and Doctor Dealer. He reported at The Philadelphia Inquirer for twenty years and is a national correspondent for The Atlantic Monthly. He lives in the Philadelphia area.
Read more from Mark Bowden
Hue 1968: A Turning Point of the American War in Vietnam Rating: 4 out of 5 stars4/5Guests of the Ayatollah: The Iran Hostage Crisis: The First Battle in America's War with Militant Islam Rating: 4 out of 5 stars4/5Doctor Dealer: The Rise and Fall of an All-American Boy and His Multimillion-Dollar Cocaine Empire Rating: 4 out of 5 stars4/5Thunder Run: The Armored Strike to Capture Baghdad Rating: 4 out of 5 stars4/5The Last Stone Rating: 3 out of 5 stars3/5Finders Keepers: The Story of a Man Who Found $1 Million Rating: 4 out of 5 stars4/5Worm: The First Digital World War Rating: 3 out of 5 stars3/5Killing Pablo: The Hunt for the World's Greatest Outlaw Rating: 4 out of 5 stars4/5The Case of the Vanishing Blonde: And Other True Crime Stories Rating: 4 out of 5 stars4/5Bringing the Heat Rating: 4 out of 5 stars4/5The Finish: The Killing of Osama bin Laden Rating: 4 out of 5 stars4/5Life Sentence: The Brief and Tragic Career of Baltimore’s Deadliest Gang Leader Rating: 4 out of 5 stars4/5The Steal: The Attempt to Overturn the 2020 Election and the People Who Stopped It Rating: 3 out of 5 stars3/5The Best Game Ever: Giants vs. Colts, 1958, and the Birth of the Modern NFL Rating: 0 out of 5 stars0 ratingsThe Three Battles of Wanat: And Other True Stories Rating: 0 out of 5 stars0 ratingsRoad Work: Among Tyrants, Heroes, Rogues, and Beasts Rating: 3 out of 5 stars3/5Executive Secrets: Covert Action & the Presidency Rating: 4 out of 5 stars4/5Truth and Lies: What People Are Really Thinking Rating: 5 out of 5 stars5/5The Emergency Teacher: The Inspirational Story of a New Teacher in an Inner-City School Rating: 0 out of 5 stars0 ratings
Related to Worm
Related ebooks
Web of Deception: Misinformation on the Internet Rating: 4 out of 5 stars4/5Zero Day: A Jeff Aiken Novel Rating: 3 out of 5 stars3/5Trojan Horse: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats Rating: 3 out of 5 stars3/5Where Wizards Stay Up Late: The Origins Of The Internet Rating: 4 out of 5 stars4/5Becoming an Ethical Hacker Rating: 4 out of 5 stars4/5Zero Day: The Threat In Cyberspace Rating: 4 out of 5 stars4/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 3 out of 5 stars3/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 0 out of 5 stars0 ratingsJoe Grand's Best of Hardware, Wireless, and Game Console Hacking Rating: 5 out of 5 stars5/5Kismet Hacking Rating: 0 out of 5 stars0 ratingsWorm: The First Digital World War Rating: 3 out of 5 stars3/5Hacking the Future: Privacy, Identity, and Anonymity on the Web Rating: 3 out of 5 stars3/5Cyberphobia: Identity, Trust, Security and the Internet Rating: 3 out of 5 stars3/5Kingdom of Lies: Unnerving Adventures in the World of Cybercrime Rating: 3 out of 5 stars3/5Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CEH v9: Certified Ethical Hacker Version 9 Study Guide Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Digital Forensics with Open Source Tools Rating: 3 out of 5 stars3/5The NSA Report: Liberty and Security in a Changing World Rating: 5 out of 5 stars5/5Professional Red Teaming: Conducting Successful Cybersecurity Engagements Rating: 0 out of 5 stars0 ratingsIntroduction to Cyber-Warfare: A Multidisciplinary Approach Rating: 5 out of 5 stars5/5InfoSec Career Hacking: Sell Your Skillz, Not Your Soul Rating: 3 out of 5 stars3/5The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Rating: 4 out of 5 stars4/5Buffer Overflow Attacks: Detect, Exploit, Prevent Rating: 4 out of 5 stars4/5Coding Freedom: The Ethics and Aesthetics of Hacking Rating: 4 out of 5 stars4/5Malware Forensics: Investigating and Analyzing Malicious Code Rating: 5 out of 5 stars5/5
Security For You
Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsWindows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5
Reviews for Worm
Rating: 3 out of 5 stars
3/5
9 ratings9 reviews
- Rating: 3 out of 5 stars3/5Worm: The First Digital World War is a narrative anatomy of the Conficker worm ca. 2009. Mark Bowden has written some great books including Black Hawk Down but in this case he seems to be over his head with the technology (or explaining it coherently). I say this as someone who understands a lot, but often found his explanations unfathomable and felt sorry for any lay reader trying to comprehend. I was also put off by the negative stereotypes of computer experts, as if it were still 1999. Beyond that though there is a good story here and it's worthwhile knowing about. The world was one command away from Internet Armageddon, with all the deaths and chaos that would unleash. Conficker is still out there laying dormant, perhaps its master in jail or assassinated by the KGB - but it shows how this type of thing can happen and hopefully this story will act as a warning to prepare. We live in interesting times and Internet security is one of the most fascinating of subjects.
- Rating: 3 out of 5 stars3/5This book started out great but then it's almost as if the author gets bored with it and it limps to the finish. While it lasted it was a good story about how computer viruses and worms are combatted and the people that do this work.
- Rating: 1 out of 5 stars1/5While this book was educational, it was very boooorrrinnnng. The author believed that he should explain the workings of a computer in order to describe the cornficker infection. After hearing about mano v mano and the foibles of various players, I decided that he had an axe to grind and set the "listen" to fast forward. I've read Bowden books in the past, but this one was baaaaad.
- Rating: 4 out of 5 stars4/5excellent, clear description of the new tech good guys=bad guys in cyber space.chilling
- Rating: 3 out of 5 stars3/5**********THIS IS A GOODREADS.COM CONTEST WIN!!!!!***********
This was an interesting book. I learned a lot about a computer that I did not know. I do not know how much of the information that the author use was real/accurate. But it was still an interesting real. Some of the terms/jargon used may not be understandable to the average person. I believe that anyone interested in computers/internet would find this book interesting and should read it.
**********THIS IS A GOODREADS.COM CONTEST WIN!!!!!*********** - Rating: 3 out of 5 stars3/5Conficker was a malicious worm that was slowly working itself into millions of unknowing computers. A Cabal was formed of savvy computer guys to try and stop it from further advance, clean up where it already appeared, and try to figure out who was behind it and what was their motive. Gentle instruction is given to the reader who may not be proficient in Internet-speak. Those who are may find this book grindingly boring as they might be totally conversant in the subject, but those of us who are not will find it helpful.Surprisingly, this story does not end with millions of computers crashing and the FBI breaking down doors arresting perps but the deadline passed without incident and the worm continues to this day, seemingly under its own steam. Attacks using this worm still continue but no world wide calamity occurred. The people who fought against it presumably continue if they haven't moved on to other threats. No big celebration of victory was held as the battle still hasn't been won. Even so, the message of the book is clear - we need to continue to be vigilant about future attacks and, for Pete's sake, people, don't pick up a USB in a parking lot and stick it in your computer!!!
- Rating: 3 out of 5 stars3/5Too many long email exchanges from the cabal. In the end - nothing happens.
- Rating: 1 out of 5 stars1/5Not very good
- Rating: 5 out of 5 stars5/5This is an account of efforts to contain the Conficker worm in 2008-2009. I thought it would read like a thriller, but it didn’t. First of all, a significant portion of the book is filled with background material: history of the Internet, history of malware, biographical sketches of the key players in the Cabal (the group that fought Conficker). Secondly, they never stopped Conficker or really learned who was behind it. I’m not saying that it wasn’t an interesting book – just that it wasn’t a page-turner. I did learn a lot about cybercrime from it. In particular, I didn’t realize that worms can make infected computers call for instructions whoever sent the worm and then crash designated websites, without the computer owners’ knowledge. Or they can take control over computers belonging to a particular bank or government agency and steal money or information – or sell control over such computers to whoever is interested. I’ve heard that one can buy anything on the Internet, but I had no idea that it includes control over “fifty computers belonging to the FBI.” This way the creators of the worm can make money with much less risk of exposure, since there’ll be no direct contact between them and the infected computers after the infection occurs. Some worm-makers don’t even infect computers themselves, but just sell their malware to whoever would like to use it. I was very surprised to learn that that’s not a crime. That is, according to the author, there’s nothing illegal in creating software that, say, exploits a flaw in the Windows operating system to gain control of other people’s computers, and in selling it to somebody. I also found out that cybercriminals can run from your garden variety bored teenage hacker who just wants to show off to very well-coordinated groups of people who are more knowledgeable and talented than the best Internet security specialists. The latter is what happened with Conficker. Whoever created that worm gave the Cabal, composed of the best and most experienced Internet professionals, a run for their money, always keeping one step ahead of them. The Cabal kept solving seemingly impossible problem, only to have their quarry upend the game once more. This begs the question as to why these people turn to crime, if they could obviously get any computer-related job in the world and make a ton of money legally, but the author never addresses this question. Another interesting point is that the Cabal was composed of network specialists who work for some company or run their own Internet-related companies, pure Internet researchers, and a volunteer who routinely spends his evenings hunting worms and then informing infected companies, without benefiting from it in any way (I was amazed that such people even exist! Ditto the guy who ran up a debt on his personal credit card to buy domains ahead of Conficker.) Anybody missing from this list? Yes, the government. It was very hard for the Cabal to get the attention of any of the relevant agencies, and then said agencies’ combined input into the effort to combat the worm was zero. Basically, if you’ve ever thought that the men and women in Washington are individuals with huge egos and feelings of entitlement who take much more from the country in the form of high salaries, benefits and various perks than they give back, this book will serve to confirm this opinion. Microsoft also comes in for its share of the blame. Before Conficker another worm had exploited a similar flaw in the Windows operating system. Back then Microsoft issued a “patch” for the port that worm had used to gain entry, but didn’t bother to check if a similar problem existed with any of the other ports. Had they done this and fixed that flaw too, Conficker wouldn’t have happened. And funnily, the author says elsewhere that if only everybody registered their Windows operating systems and allowed all the security updates from Microsoft to go through, Windows would have been “well near impregnable.” Yeah, right!I don’t know if people who’re into computers would find this book informative, but for me it was interesting to look over the shoulders of the Internet defenders, as they go about their work.