Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global

Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global

2020 | ISBN: 1789142857 | English | 336 Pages | True EPUB | 0.3 MB

On May 4, 2000, an email that read "kindly check the attached LOVELETTER" was sent from a computer in the Philippines. Attached was avirus, the Love Bug, and within days it had been circulated across the globe, paralyzing banks, broadcasters, and businesses in its wake, and extending as far as the UK Parliament and, reportedly, the Pentagon. The outbreak presaged a new era of online mayhem: the age of Crime Dot Com. In this book, investigative journalist Geoff White charts the astonishing development of hacking, from its conception in the United States' hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as one of the most dangerous and pervasive threats to our connected world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks to make millions are being harnessed by nation states to target voters, cripple power networks, and even prepare for cyber-war. From Anonymous to the Dark Web, Ashley Madison to election rigging, Crime Dot Com is a thrilling, dizzying, and terrifying account of hacking, past and present, what the future has in store, and how we might protect ourselves from it.

Download:

http://longfiles.com/slnb93ivhtxs/Crime_Dot_Com_From_Viruses_to_Vote_Rigging,_How_Hacking_Went_Global.epub.html

[Fast Download] Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global


Related eBooks:
Self-defense essentials for women: Hands off! Fight back offenders with simple and effective techniq
Self-defense for women: Hands off! How to fight back any offender with basic techniques
How to set up remote access to IP cameras
Probabilistic Machine Learning for Civil Engineers (The MIT Press)
25 in 1 Electronic Project On Breadboard: Flasher, alarm, detector, ultrasonic, timer
What Are the Dangers of Online Scams?
Network Security Foundations: Technology Fundamentals for IT Success
The Baby Harvest: How virtual babies became the future of terrorist funding and criminal laundering
WarDriving and Wireless Penetration Testing
Hardening Linux
Illustrated Manual of Sniper Skills
Android Tips Tricks Apps & Hacks
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.