Listen free for 30 days
Listen with offer
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
Failed to add items
Add to basket failed.
Add to wishlist failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
£0.00 for first 30 days
Buy Now for £12.99
No valid payment method on file.
We are sorry. We are not allowed to sell this product with the selected payment method
Summary
Brought to you by Penguin.
It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott Shapiro exposes the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human story, he tells the fascinating tales of perpetrators including Robert Morris Jr, the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian 'Dark Avenger' who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone and the Russian intelligence officers who sought to take control of a US election, among others.
In telling their stories, Shapiro exposes the hackers' tool kits and gives fresh answers to vital questions: why is the internet so vulnerable? What can we do in response? The result is a lively and original account of the future of hacking, espionage and war, and of how to live in an era of cybercrime.
Critic reviews
What listeners say about Fancy Bear Goes Phishing
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Martyn
- 13-08-23
Interesting and exploits explained
Good to hear some exploits explained. Although tends to be the basic ones, like buffer overflow. The relentless mentioning of upcode and downcode gets annoying though.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Raim Dragonetti
- 05-12-23
Turned My Vague Concern about Data Security Into Something Really Tangible and Useful
I felt that I learnt so much without having to sweat over too many technicalities (though my background did include Assembler programming) There was a run of chapters from Kill Chain to the Attack of the Killer Toasters where I couldn’t put the book down. On the downside, I couldn’t see where it was going for the first few chapters and the conclusion seemed a bit esoteric. But it was so good that I bought a paper copy for a friend and I plan to listen to the middle chapters again to help me make some changes to the way I do things.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Hans-Petter
- 10-10-23
Great overview
Even though this is all stuff I am very familiar with I still found it useful set into such a connection and overview. Great telling and always good with a repeat for us who knows.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- MR D S LAMBERT
- 29-06-23
Excellent
A fantastic history of cyber security and hacking. Narrated very well and always interesting. I even went back over a few things for my own understanding and research. overall - excellent.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Lande Riege
- 29-05-23
Fascinating history of hacking’s past and a view to its future
Cyber breaches are older than most think. This book is an entertaining education of its history and what is to come. Enjoyed the reading voice too.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- C. Serginson
- 04-12-23
If you have tech knowledge you'll be fine
I learnt a lot listening to this. I found the history of how the internet and operating systems developed through the stories of the early hacks fascinating. The concept of upcode versus down code was also new to me and thought provoking. However, I did get lost later in the book which was down to my lack of knowledge rather than a failure of the author.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Zaba
- 29-05-24
Fancy bear for beginners Not Much Depth
Again, this book doesn’t go into much depth about how cybersecurity works or how it can be used. Instead, it’s a collection of stories about cybersecurity with very easy explanations of how things can work. Don’t expect a deep dive into the technology’s story. It’s okay but not great, in my opinion, though I seem to be in the minority.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Sid the Kid
- 22-10-23
I wanted to like this but…
…it was just a bit heavy going. Reading out code rather than having a PDF attachment to look at, inventing own terms like vorms and wiruses, all added up to a disappointing experience. If you haven’t read/listened to This Is How They Tell Me The World Ends, that is vastly better.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!