KIM ZETTER is an award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired. She was among the first journalists to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. She has also broken numerous stories over the years about WikiLeaks and Bradley Manning, NSA surveillance, and the hacker underground.
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at a uranium enrichment plant in Iran were failing and being replaced at an unprecedented rate. The cause of their failure was a complete mystery.
Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.
Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away.
And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.
Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
發表於2024-11-26
Countdown to Zero Day 2024 pdf epub mobi 電子書 下載
2010年初,伊朗境內鈾濃縮工廠離心機開始接二連三齣現過載故障,緻使當時伊朗整個核計劃被迫陷入停滯狀態。事後,一傢白俄羅斯網絡安全公司應邀對伊朗核工業電腦係統進行檢查時,意外地發現伊朗工業電腦係統上蔓延著一種來源可疑的病毒。起初,該公司的技術人員以為這隻是一種...
評分2010年初,伊朗境內鈾濃縮工廠離心機開始接二連三齣現過載故障,緻使當時伊朗整個核計劃被迫陷入停滯狀態。事後,一傢白俄羅斯網絡安全公司應邀對伊朗核工業電腦係統進行檢查時,意外地發現伊朗工業電腦係統上蔓延著一種來源可疑的病毒。起初,該公司的技術人員以為這隻是一種...
評分2010年初,伊朗境內鈾濃縮工廠離心機開始接二連三齣現過載故障,緻使當時伊朗整個核計劃被迫陷入停滯狀態。事後,一傢白俄羅斯網絡安全公司應邀對伊朗核工業電腦係統進行檢查時,意外地發現伊朗工業電腦係統上蔓延著一種來源可疑的病毒。起初,該公司的技術人員以為這隻是一種...
評分2010年初,伊朗境內鈾濃縮工廠離心機開始接二連三齣現過載故障,緻使當時伊朗整個核計劃被迫陷入停滯狀態。事後,一傢白俄羅斯網絡安全公司應邀對伊朗核工業電腦係統進行檢查時,意外地發現伊朗工業電腦係統上蔓延著一種來源可疑的病毒。起初,該公司的技術人員以為這隻是一種...
評分2010年初,伊朗境內鈾濃縮工廠離心機開始接二連三齣現過載故障,緻使當時伊朗整個核計劃被迫陷入停滯狀態。事後,一傢白俄羅斯網絡安全公司應邀對伊朗核工業電腦係統進行檢查時,意外地發現伊朗工業電腦係統上蔓延著一種來源可疑的病毒。起初,該公司的技術人員以為這隻是一種...
圖書標籤: 網絡戰爭 安全 敘事 英文原版 stuxnet 震網 計算機 科普
https://www.kancloud.cn/kancloud/countdown-to-zero-day/90018
評分安全牛連載翻譯作品,詳細講解震網、火焰、高斯等係列病毒的發現、分析過程,美以針對伊朗核設施發起的首次網絡動能打擊戰爭。
評分安全牛連載翻譯作品,詳細講解震網、火焰、高斯等係列病毒的發現、分析過程,美以針對伊朗核設施發起的首次網絡動能打擊戰爭。
評分讀的是內部譯本,李雲凡編譯,2016年5月齣版
評分非常棒的一本書。很有啓發。
Countdown to Zero Day 2024 pdf epub mobi 電子書 下載