Worm: The First Digital World War
By Mark Bowden
3/5
()
Unavailable in your country
Unavailable in your country
About this ebook
This dramatic cybercrime story travels from the Ukraine to the United States (and all parts in between) to explore the next frontier in terrorism. It is the story of a dazzling battle of wits over the future of the Internet. In Worm, Mark Bowden delivers an unputdownable account of the ongoing and largely unreported war taking place literally beneath our fingertips.
Mark Bowden
Mark Bowden, voted the number one body language professional in the world by Global Gurus, is a renowned thought leader in the field of nonverbal communication. Principal at groundbreaking communications organization TRUTHPLANE, Mark is sought after internationally for his entertaining and inspirational keynote speeches. He has a popular TEDx talk, media appearances worldwide, and bestselling books enjoyed by millions. Tracey Thomson, co-founder of TRUTHPLANE, advises the world's top companies and individuals on issues involving communication and body language. Her background in directing and training performers internationally in the psychology of movement, as well as her professional experience analyzing and supplying solutions to the dramas we find ourselves in, gives her unique insights into human behavior and what people are really thinking.
Read more from Mark Bowden
Killing Pablo: The Hunt for the World's Greatest Outlaw Rating: 4 out of 5 stars4/5Hue 1968: A Turning Point of the American War in Vietnam Rating: 4 out of 5 stars4/5The Last Stone Rating: 3 out of 5 stars3/5Doctor Dealer: The Rise and Fall of an All-American Boy and His Multimillion-Dollar Cocaine Empire Rating: 4 out of 5 stars4/5Guests of the Ayatollah: The Iran Hostage Crisis: The First Battle in America's War with Militant Islam Rating: 4 out of 5 stars4/5The Finish: The Killing of Osama bin Laden Rating: 4 out of 5 stars4/5Thunder Run: The Armored Strike to Capture Baghdad Rating: 4 out of 5 stars4/5Finders Keepers: The Story of a Man Who Found $1 Million Rating: 4 out of 5 stars4/5The Three Battles of Wanat: And Other True Stories Rating: 0 out of 5 stars0 ratingsBringing the Heat Rating: 4 out of 5 stars4/5Life Sentence: The Brief and Tragic Career of Baltimore’s Deadliest Gang Leader Rating: 4 out of 5 stars4/5Worm: The First Digital World War Rating: 3 out of 5 stars3/5The Case of the Vanishing Blonde: And Other True Crime Stories Rating: 4 out of 5 stars4/5The Steal: The Attempt to Overturn the 2020 Election and the People Who Stopped It Rating: 3 out of 5 stars3/5The Best Game Ever: Giants vs. Colts, 1958, and the Birth of the Modern NFL Rating: 0 out of 5 stars0 ratingsRoad Work: Among Tyrants, Heroes, Rogues, and Beasts Rating: 3 out of 5 stars3/5Truth and Lies: What People Are Really Thinking Rating: 5 out of 5 stars5/5Executive Secrets: Covert Action & the Presidency Rating: 4 out of 5 stars4/5The Emergency Teacher: The Inspirational Story of a New Teacher in an Inner-City School Rating: 0 out of 5 stars0 ratings
Related to Worm
Related ebooks
Worm: The First Digital World War Rating: 3 out of 5 stars3/5Zero Day: The Threat In Cyberspace Rating: 4 out of 5 stars4/5The Threatened Net: How the Web Became a Perilous Place Rating: 0 out of 5 stars0 ratingsThe Philosopher of Palo Alto: Mark Weiser, Xerox PARC, and the Original Internet of Things Rating: 0 out of 5 stars0 ratingsSummary of Andrew J. Stewart's A Vulnerable System Rating: 0 out of 5 stars0 ratingsRaspberry Pi for Arduino Users: Building IoT and Network Applications and Devices Rating: 0 out of 5 stars0 ratingsHacking: A Comprehensive Guide to Computer Hacking and Cybersecurity Rating: 0 out of 5 stars0 ratingsThe Effects of Cybercrime in the U.S. and Abroad Rating: 0 out of 5 stars0 ratingsThe Office of the Future: Communication and Computers Rating: 0 out of 5 stars0 ratingsUnderstanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition Rating: 0 out of 5 stars0 ratingsHACKING THROUGH TIME: From Tinkerers to Enemies of the State (and sometimes, State-Sponsored) Rating: 0 out of 5 stars0 ratingsHow Does Streaming Work? Rating: 0 out of 5 stars0 ratingsSummary of Steven Levy's Insanely Great Rating: 0 out of 5 stars0 ratingsPiracy: The Intellectual Property Wars from Gutenberg to Gates Rating: 4 out of 5 stars4/5The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Rating: 0 out of 5 stars0 ratingsAt Large: The Strange Case of the World's Biggest Internet Invasion Rating: 4 out of 5 stars4/5Summary of John P. Carlin & Garrett M. Graff's Dawn of the Code War Rating: 0 out of 5 stars0 ratingsA Vulnerable System: The History of Information Security in the Computer Age Rating: 0 out of 5 stars0 ratingsDefending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time Rating: 0 out of 5 stars0 ratingsDigital Clues Rating: 0 out of 5 stars0 ratingsThe Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Rating: 0 out of 5 stars0 ratingsVan Arnem: Technology Pioneer Rating: 0 out of 5 stars0 ratingsGutsy Girls Go For Science: Programmers: With Stem Projects for Kids Rating: 0 out of 5 stars0 ratingsInventing the Internet Rating: 0 out of 5 stars0 ratingsTrojan Horse: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age Rating: 4 out of 5 stars4/5Kali Linux 2: Windows Penetration Testing Rating: 5 out of 5 stars5/5Joe Grand's Best of Hardware, Wireless, and Game Console Hacking Rating: 5 out of 5 stars5/5Deep Web: All the mysteries and secrets behind the hidden side of the internet Rating: 0 out of 5 stars0 ratingsHacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5
Computers For You
Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsStandard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Dawn of the New Everything: Encounters with Reality and Virtual Reality Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Web Designer's Idea Book, Volume 4: Inspiration from the Best Web Design Trends, Themes and Styles Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsPeople Skills for Analytical Thinkers Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5
Reviews for Worm
77 ratings9 reviews
- Rating: 3 out of 5 stars3/5This book started out great but then it's almost as if the author gets bored with it and it limps to the finish. While it lasted it was a good story about how computer viruses and worms are combatted and the people that do this work.
- Rating: 3 out of 5 stars3/5Conficker was a malicious worm that was slowly working itself into millions of unknowing computers. A Cabal was formed of savvy computer guys to try and stop it from further advance, clean up where it already appeared, and try to figure out who was behind it and what was their motive. Gentle instruction is given to the reader who may not be proficient in Internet-speak. Those who are may find this book grindingly boring as they might be totally conversant in the subject, but those of us who are not will find it helpful.Surprisingly, this story does not end with millions of computers crashing and the FBI breaking down doors arresting perps but the deadline passed without incident and the worm continues to this day, seemingly under its own steam. Attacks using this worm still continue but no world wide calamity occurred. The people who fought against it presumably continue if they haven't moved on to other threats. No big celebration of victory was held as the battle still hasn't been won. Even so, the message of the book is clear - we need to continue to be vigilant about future attacks and, for Pete's sake, people, don't pick up a USB in a parking lot and stick it in your computer!!!
- Rating: 3 out of 5 stars3/5**********THIS IS A GOODREADS.COM CONTEST WIN!!!!!***********
This was an interesting book. I learned a lot about a computer that I did not know. I do not know how much of the information that the author use was real/accurate. But it was still an interesting real. Some of the terms/jargon used may not be understandable to the average person. I believe that anyone interested in computers/internet would find this book interesting and should read it.
**********THIS IS A GOODREADS.COM CONTEST WIN!!!!!*********** - Rating: 1 out of 5 stars1/5While this book was educational, it was very boooorrrinnnng. The author believed that he should explain the workings of a computer in order to describe the cornficker infection. After hearing about mano v mano and the foibles of various players, I decided that he had an axe to grind and set the "listen" to fast forward. I've read Bowden books in the past, but this one was baaaaad.
- Rating: 1 out of 5 stars1/5Not very good
- Rating: 3 out of 5 stars3/5Too many long email exchanges from the cabal. In the end - nothing happens.
- Rating: 3 out of 5 stars3/5Worm: The First Digital World War is a narrative anatomy of the Conficker worm ca. 2009. Mark Bowden has written some great books including Black Hawk Down but in this case he seems to be over his head with the technology (or explaining it coherently). I say this as someone who understands a lot, but often found his explanations unfathomable and felt sorry for any lay reader trying to comprehend. I was also put off by the negative stereotypes of computer experts, as if it were still 1999. Beyond that though there is a good story here and it's worthwhile knowing about. The world was one command away from Internet Armageddon, with all the deaths and chaos that would unleash. Conficker is still out there laying dormant, perhaps its master in jail or assassinated by the KGB - but it shows how this type of thing can happen and hopefully this story will act as a warning to prepare. We live in interesting times and Internet security is one of the most fascinating of subjects.
- Rating: 5 out of 5 stars5/5This is an account of efforts to contain the Conficker worm in 2008-2009. I thought it would read like a thriller, but it didn’t. First of all, a significant portion of the book is filled with background material: history of the Internet, history of malware, biographical sketches of the key players in the Cabal (the group that fought Conficker). Secondly, they never stopped Conficker or really learned who was behind it. I’m not saying that it wasn’t an interesting book – just that it wasn’t a page-turner. I did learn a lot about cybercrime from it. In particular, I didn’t realize that worms can make infected computers call for instructions whoever sent the worm and then crash designated websites, without the computer owners’ knowledge. Or they can take control over computers belonging to a particular bank or government agency and steal money or information – or sell control over such computers to whoever is interested. I’ve heard that one can buy anything on the Internet, but I had no idea that it includes control over “fifty computers belonging to the FBI.” This way the creators of the worm can make money with much less risk of exposure, since there’ll be no direct contact between them and the infected computers after the infection occurs. Some worm-makers don’t even infect computers themselves, but just sell their malware to whoever would like to use it. I was very surprised to learn that that’s not a crime. That is, according to the author, there’s nothing illegal in creating software that, say, exploits a flaw in the Windows operating system to gain control of other people’s computers, and in selling it to somebody. I also found out that cybercriminals can run from your garden variety bored teenage hacker who just wants to show off to very well-coordinated groups of people who are more knowledgeable and talented than the best Internet security specialists. The latter is what happened with Conficker. Whoever created that worm gave the Cabal, composed of the best and most experienced Internet professionals, a run for their money, always keeping one step ahead of them. The Cabal kept solving seemingly impossible problem, only to have their quarry upend the game once more. This begs the question as to why these people turn to crime, if they could obviously get any computer-related job in the world and make a ton of money legally, but the author never addresses this question. Another interesting point is that the Cabal was composed of network specialists who work for some company or run their own Internet-related companies, pure Internet researchers, and a volunteer who routinely spends his evenings hunting worms and then informing infected companies, without benefiting from it in any way (I was amazed that such people even exist! Ditto the guy who ran up a debt on his personal credit card to buy domains ahead of Conficker.) Anybody missing from this list? Yes, the government. It was very hard for the Cabal to get the attention of any of the relevant agencies, and then said agencies’ combined input into the effort to combat the worm was zero. Basically, if you’ve ever thought that the men and women in Washington are individuals with huge egos and feelings of entitlement who take much more from the country in the form of high salaries, benefits and various perks than they give back, this book will serve to confirm this opinion. Microsoft also comes in for its share of the blame. Before Conficker another worm had exploited a similar flaw in the Windows operating system. Back then Microsoft issued a “patch” for the port that worm had used to gain entry, but didn’t bother to check if a similar problem existed with any of the other ports. Had they done this and fixed that flaw too, Conficker wouldn’t have happened. And funnily, the author says elsewhere that if only everybody registered their Windows operating systems and allowed all the security updates from Microsoft to go through, Windows would have been “well near impregnable.” Yeah, right!I don’t know if people who’re into computers would find this book informative, but for me it was interesting to look over the shoulders of the Internet defenders, as they go about their work.
- Rating: 4 out of 5 stars4/5excellent, clear description of the new tech good guys=bad guys in cyber space.chilling