Continuando con el ejemplo iniciado por Wikileaks, el 5 de Junio del 2013, el periódico The Guardian hizo la más importante desclasificación de información secreta de los Estados Unidos. Hydra 680 revive esta historia a través de las vidas de sus protagonistas: J. Assange, Edward Snowden, Ron Paul, Laura Poitras y Barack Obama.
The Spy Within is the riveting true story of one of the most significant cases is the history of espionage—the penetration of the CIA by a Chinese spy for 30 years. Larry Chin was as a double-agent whose spying encompassed such pivotal events as the Korean War, the Cultural Revolution in China, the Vietnam War, and Nixon’s groundbreaking visit tor Beijing. Chin’s reports were circulated to China’s top leaders and read by Mao, Zhou Enlai and Deng Xiaoping.
“Suspenseful cloak-and-dagger reenactment of the FBI sting that exposed a Chinese-American double agent in 1985…Hoffman possesses a solid command of his material and conveys the secretive nature of espionage agencies with a novelist’s panache,” said Kirkus.
Continue reading “The Spy Within”
Computer viruses can be confusing. They can also be fascinating. This book is about a notorious computer virus Stuxnet. You might be wondering: there are so many computer viruses, why Stuxnet? What is so special about the Stuxnet computer worm? Stuxnet never managed to become the biggest, the scariest, or the most sophisticated malware. At the same time, because of some unexpected twists of fate, Stuxnet had become much more than just a computer worm. Stuxnet brought from shadows into spotlight some very serious issues with the Internet security ranging from stolen digital certificates and defenselessness of industrial computers to an existence of “gray” market of pre-written software vulnerabilities for sale. Overall, the story of Stuxnet is a story of its evolution from an ordinary malware to a cyber-weapon that was followed by its major transformation into a successful long-term propaganda-weapon.
The appearance of Stuxnet that was loaded with two digital certificates and four previously unknown breaches in Window’s defense raised some painful questions. Who was behind Stuxnet? For how long was this cyber-war going on? Are secure Internet transactions really secure? Can we trust digital certificates? Who is in the business of creating and selling malware to penetrate Internet browsers’ security? The story of the computer worm Stuxnet is full of surprises and unexpected twists that might change your opinion about the present and future of the Internet and the World Wide Web.
Chinese Cyber Crime is the first comprehensive book describing the hacking underworld within the People's Republic of China. Based upon direct field research and experience with Chinese hackers this book goes where no other has gone before. China's latest national security law and draft cyber security sovereignty law are introduced and reviewed in applicability to China's efforts to control nefarious Chinese cybercrime. This is a second edition for 2016.
Chinese Cyber Crime is the first comprehensive book describing the hacking underworld within the People's Republic of China. Based upon direct field research and experience with Chinese hackers this book goes where no other has gone before. China's latest national security law and draft cyber security sovereignty law are introduced and reviewed in applicability to China's efforts to control nefarious Chinese cybercrime. Industry advice and guidance aptly provided by Tommy Stiansen, CTO, Norse Corporation.