In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world’s powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict.
The Perfect Weapon
is the startling inside story of how the rise of cyberweapons
transformed geopolitics like nothing since the invention of the atomic
bomb. Cheap to acquire, easy to deny, and usable for a variety of
malicious purposes—from crippling infrastructure to sowing discord and
doubt—cyber is now the weapon of choice for democracies, dictators, and
terrorists. Two presidents—Bush and Obama—drew first blood with
Operation Olympic Games, which used malicious code to blow up Iran’s
nuclear centrifuges, and yet America proved remarkably unprepared when
its own weapons were stolen from its arsenal and, during President
Trump’s first year, turned back on the US and its allies. The government
was often paralyzed, unable to threaten the use of cyberweapons because
America was so vulnerable to crippling attacks on its own networks of
banks, utilities, and government agencies.
Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times
national security correspondent David Sanger—who broke the story of
Olympic Games in his previous book—reveals a world coming face-to-face
with the perils of technological revolution. The Perfect Weapon is
the dramatic story of how great and small powers alike slipped into a
new era of constant sabotage, misinformation, and fear, in which
everyone is a target.
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
#GoLinux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.
Expat Money Show Podcast
The Expat Money Show is a Podcast that has grown to a worldwide community of Entrepreneurs who are living international location independent lifestyles. Mikkel Thorup Read more.
PCLinuxOS is a free easy to use Linux-based Operating System for desktops or laptops. Everything you do with that other OS you can do with Read more.
Citizen’s Privacy Manual
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to you How to buy and establish Read more.
Code 2600 Documentary
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film Read more.
The CyberWire Podcast
The CyberWire Podcast distills the day’s critical cyber security news into a concise daily podcast. Building upon their popular Daily Briefing, The CyberWire podcast includes Read more.
The open source Ubuntu desktop operating system powers millions of PCs and laptops around the world. Ubuntu comes with everything you need to run your Read more.
2020 is not a new year. It is a new decade. It is time to lose the excuses and live the life you want to Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
End of Privacy Podcast
The End of Privacy is a podcast miniseries by author B.J. Mendelson (Social Media is Bull, St. Martin’s Press) who talks about your data,what is Read more.
The purpose of Linux Mint is to produce a modern, elegant and comfortable operating system which is both powerful and easy to use. Linux Mint Read more.
The Platform Society
Public Values in a Connective World Individuals all over the world can use Airbnb to rent an apartment in a foreign city, check Coursera to Read more.
The folks over at System76 believe the computer and operating system are the most powerful and versatile tools ever created. That is why they built Read more.
The Battle to Control the Design of New Technologies Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance Read more.