In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world’s powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict.

The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents—Bush and Obama—drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies.

Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger—who broke the story of Olympic Games in his previous book—reveals a world coming face-to-face with the perils of technological revolution. The Perfect Weapon is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.