Description : Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.
Description : Looks at how banks and their lending policies facilitate fraud and identity theft, revealing the many ways large lending institutions have put customers at risk to maximize profits.
Description : Will the world’s next war be fought in cyberspace? "It's going to happen," said former National Defense University Professor Dan Kuehl. So much of the world’s activity takes place on the internet now – including commerce, banking and communications -- the Pentagon has declared war in cyberspace an inevitability. For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This ebook, Zero Day: The Threat in Cyberspace, is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.
Description : Combat veteran and U. S. Army investigator John Puller is on the hunt for justice with the help of a homicide detective -- but as they face deceptions and dead ends, a powerful force threatens to stop them forever. John Puller is a combat veteran and the best military investigator in the U.S. Army's Criminal Investigative Division. His father was an Army fighting legend, and his brother is serving a life sentence for treason in a federal military prison. Puller has an indomitable spirit and an unstoppable drive to find the truth. Now, Puller is called out on a case in a remote, rural area in West Virginia coal country far from any military outpost. Someone has stumbled onto a brutal crime scene, a family slaughtered. The local homicide detective, a headstrong woman with personal demons of her own, joins forces with Puller in the investigation. As Puller digs through deception after deception, he realizes that absolutely nothing he's seen in this small town, and no one in it, are what they seem. Facing a potential conspiracy that reaches far beyond the hills of West Virginia, he is one man on the hunt for justice against an overwhelming force.
Description : An airliner's controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the USA, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction. At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe. Written by a global authority on cyber-security, Zero Day presents a chilling 'what if' scenario that, in a world completely reliant on technology, is more than possible today... it's a cataclysmic disaster just waiting to happen. 'Mark came to Microsoft in 2006 to help advance the state of the art of Windows, now in his latest compelling creation he is raising awareness of the all too real threat of cyber-terrorism.' Bill Gates 'CyberTerrorism. Get used to that word and understand it because you're going to see more of it in the newspapers and hear it on the news in the not too distant future. Mark Russinovich is a CyberSecurity expert who has turned his considerable knowledge into a very scary and too plausible novel. Zero Day is not science fiction; it is science fact, and it is a clear warning of Doomsday.' Nelson DeMille 'While what Mark wrote is fiction, the risks that he writes about eerily mirror many situations that we see today.' Howard A. Schmidt, White House Cyber Security Coordinator 'An up-to-the-moment ticking-clock thriller, Zero Day imagines the next 9/11 in a frightening but all too believable way. An expert in the field, Mark Russinovich writes about cyberterrorism with a mix of technical authority and dramatic verve. I was riveted.' William Landay, author of The Strangler 'When someone with Mark Russinovich's technical chops writes a tale about tech gone awry, leaders in the public and private sector should take notes.' Daniel Suarez, author of Daemon 'Nothing if not topical... a full share of conspiracies, betrayals, violence and against-the-clock maneuvers.' Kirkus Reviews
Description : The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community.
Description : Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There’s also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.
Description : Daniqua was just a regular single woman; hungry, horny, and trying to make it on her own in the world. But her past came calling and now her weekend plans are FUBAR. Will she play her role, prevent nuclear annihilation, and win financial freedom? What will be her answer to The Zero Day Proposal?
Description : Zero-day vulnerabilities--software vulnerabilities for which no patch or fix has been publicly released-- and their exploits are useful in cyber operations--whether by criminals, militaries, or governments--as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that could augment conventional proxy examples and expert opinion, complement current efforts to create a framework for deciding whether to disclose or retain a cache of zero-day vulnerabilities and exploits, inform ongoing policy debates regarding stockpiling and vulnerability disclosure, and add extra context for those examining the implications and resulting liability of attacks and data breaches for U.S. consumers, companies, insurers, and for the civil justice system broadly. The authors provide insights about the zero-day vulnerability research and exploit development industry; give information on what proportion of zero-day vulnerabilities are alive (undisclosed), dead (known), or somewhere in between; and establish some baseline metrics regarding the average lifespan of zero-day vulnerabilities, the likelihood of another party discovering a vulnerability within a given time period, and the time and costs involved in developing an exploit for a zero-day vulnerability"--Publisher's description.
Description : The United States goes to war against the queen spiders that threaten to overtake the human race forever in this thrilling and horrifying finale of the “captivating, engaging, and completely terrifying” (My Guilty Obsession) internationally bestselling Hatching series. The world is on the brink of apocalypse. Zero Day has come. The only thing more terrifying than millions of spiders is the realization that those spiders work as one. But among the government, there is dissent: do we try to kill all of the spiders, or do we gamble on Professor Guyer’s theory that we need to kill only the queens? For President Stephanie Pilgrim, it’s an easy answer. She’s gone as far as she can—more than two dozen American cities hit with tactical nukes, the country torn asunder—and the only answer is to believe in Professor Guyer. Unfortunately, Ben Broussard and the military men who follow him don’t agree, and Pilgrim, Guyer, and the loyal members of the government have to flee, leaving the question: what’s more dangerous, the spiders or ourselves?