Local cover image
Local cover image
Amazon cover image
Image from Amazon.com

Fancy bear goes phishing : Scott J. Shapiro the dark history of the information age, in five extraordinary hacks /

By: Material type: TextTextPublication details: India Penguin Books 2023Description: 420pISBN:
  • 9780241461969
Subject(s): DDC classification:
  • 364.168 SHA-S
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Shelving location Call number Copy number Status Date due Barcode Item holds
Books Books BITS Pilani Hyderabad 360 General Stack (For lending) 364.168 SHA-S (Browse shelf(Opens below)) INR 1299.00 Available 48171
Total holds: 0

Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the elite hacking unit within Russian military intelligence broke into the Democratic National Committee network, grabbed what it could, and may have contributed to the election of Donald Trump.

Robert Morris was curious. Experimenting one night, the graduate student from Cornell University released "the Great Worm" and became the first person to crash the internet.

Dark Avenger was in love. To impress his crush, the Bulgarian hacker invented the first mutating computer virus-engine and nearly destroyed the anti-virus industry.

Why is the internet so insecure? How do hackers exploit its vulnerabilities? Fancy Bear Goes Phishing tells the stories of five great hacks, their origins, motivations and consequences. As well as Fancy Bear, Robert Morris and Dark Avenger, we meet Cameron Lacroix, a sixteen-year-old from South Boston, who hacked Paris Hilton's cell phone because he wanted to be famous and Paras Jha, a Rutgers undergraduate, who built a giant botnet designed to get him out of his calculus exam and disrupt the online game Minecraft, but which almost destroyed the internet in the process. Scott Shapiro's five stories demonstrate that computer hacking is not just a tale of technology, but of human beings.

Yet as Shapiro shows, hackers do not just abuse computer code - they exploit the philosophical principles of computation: the very features that make computers possible also make hacking possible. He explains how our information society works, the ways our data is stored and manipulated, and why it is so subject to exploitation. Both intellectual romp and dramatic true-crime narrative, Fancy Bear Goes Phishing exposes the secrets of the digital age.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
An institution deemed to be a University Estd. Vide Sec.3 of the UGC
Act,1956 under notification # F.12-23/63.U-2 of Jun 18,1964

© 2015 BITS-Library, BITS-Hyderabad, India.