Scary cyber: 3 haunting books in time for Halloween

Scary cyber: 3 haunting books in time for Halloween

Halloween

Hackers pose a frightening threat to businesses and society today; the idea of being completely taken down by a cyber-attack is enough to terrify anyone.

Here are 3 books which tell the story of some pretty spooky hacking scenarios. However, they also help inform individuals how to prevent being startled by the cyber threat. After all, knowledge is power.

1. Ghost In The Wires: My Adventures as the World's Most Wanted Hacker by Kevin Mitnick

Published May 2012

With almost 5 stars on Amazon and a foreword written by Steve Wosniak, the co-founder of Apple, this book delves into the dark world of hacking. It explores the cybercriminal journey taken by Kevin Mitnick, who is both the author and the protagonist of the story.

In a review, the National Public Radio explain why they value the book: 'Mitnick manages to make breaking computer code sound as action-packed as robbing a bank'. But Ghost in The Wires is an educational, as well as exciting, read.

Described as ‘the most elusive computer break-in artist in history’, Mitnick gives a fascinating insight into his daring ventures. He explains his ‘instinct for finding a way around barriers and safeguards’. So, if we can understand what motivates hackers, this might make it easier to create stronger defences against them.

Tech expert Scott Schober says, in his short cyber security book review on YouTube, Ghost in the Wires is ‘a must read for anyone who loves technology and computers’. It could prove a very important read not just for tech lovers, but for individuals who are trying to be more cyber savvy in the face of the snowballing cyber threat.

2. Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier

Published September 2018

With a title dramatic enough to either intrigue or repel its reader, Bruce Schenier warns: 'A world of "smart" devices means the Internet can kill people. We need to act. Now'. The sense of danger is only heighted by the red front cover.

But what is security expert and author Schenier most worried about? He fears specifically for the Internet of Things, and how our everyday products and services can be hacked. This leaves users extremely vulnerable. The introduction warns: ‘Everything is becoming a computer’.

A review by the Financial Times states 'Schneier skilfully guides readers through serious attacks that have happened already—and moves on to those he believes are just over the horizon...Schneier sets out detailed solutions that should be required reading for politicians across the world'.

Titled a ‘security guru’ by the Economist, he also wrote the bestselling book Data and Goliath. This could certainly be a survival guide worth getting your hands on.

3. The Perfect Weapon: war, sabotage, and fear in the cyber age by David E Sanger

Published June 2018

David E Sanger is a New York Times bestselling author and national security correspondent. In this book, he tells ‘The riveting story of how, in less than a decade, cyberwarfare displaced terrorism and nuclear attacks as the greatest threat to international security’ – as described by goodreads.

Sanger truly highlights the serious threat that cyber-attacks pose today. The blurb describes it as ‘a dramatic story of a new era of constant sabotage, misinformation, and fear, in which everyone is a target’.

According to The Telegraph, Sanger ‘writes with persuasiveness and authority’, alerting the reader to the ways cyber warfare is shaping and dominating what modern society should be most afraid of. Being aware of this important narrative is the first step to finding necessary solutions.

These eye-opening books articulate the nature of the pervasive cyber threat, and provide informative insights into the tense technological world. How we inhabit this world and navigate these dangers is by no means easy, but with the right rule books, we can reduce the cyber risk.

Copyright Lyonsdown Limited 2021

Top Articles

It’s time to upgrade the supply chain attack rule book

How can infosec professionals critically reassess how they detect and quickly prevent inevitable supply chain attacks?

Driving eCommerce growth across Africa

Fraud prevention company Forter has partnered with payments technology provider Flutterwave to drive eCommerce growth across Africa and beyond.

Over 500,000 Huawei phones found infected with Joker malware

The Joker malware infiltrated over 500,000 Huawei phones via ten apps using which the malware communicates with a command and control server.

Related Articles