


ISBN-13: 9781119895183 / Angielski / Twarda / 2022 / 250 str.
ISBN-13: 9781119895183 / Angielski / Twarda / 2022 / 250 str.
"What makes him stand out is that, although he is a master coder and cyber security engineer, he is a superb communicator."--Misha Glenny, Financial Times"An excellent and engaging survey of cybersecurity..."--Kristie Lu Stout, CNN anchor and correspondent"Mikko Hypponen's If It's Smart, It's Vulnerable is a fascinating and engaging tour of the past, present, and likely future of cybersecurity by an expert who's spent three decades at the front lines of the global war against malware. Technical and non-technical readers alike will find Hypponen's personal anecdotes informative and highly entertaining as he explores the evolution of the systems that power modern society--along with the risks and rewards they present to us all. Highly recommended."--Daniel Suarez, New York Times bestselling author of Daemon"If It's Smart, It's Vulnerable is not just a book for techies and hackers. The stories and examples make it accessible to anyone!"--Keren Elazari, friendly hacker and a TED speaker"As the namesake of Hypponen's law, Mikko is the right person to explain how everything is getting connected, and what we should do to secure all devices on the internet -- both the smart ones and the stupid ones."--Robert M. Lee, founder and CEO of Dragos Inc."As we rush forward with an insatiable desire to connect everything, Mikko shines a light on the risks we accept yet often fail to understand...until it's too late."--Troy Hunt, founder of Have I Been Pwned"Mikko has a remarkably lucid understanding of cyber security and the history of the Internet. You'll come away with an appreciation of the major problems and the high stakes that come with any attempt to keep our networks and systems secure."--Jack Rhysider, Creator of the Darknet Diaries podcast"A breezy survey of cybersecurity from one of the pillars of our industry. There's not a lot that Mikko hasn't seen."--Eva Galperin, Director of Cybersecurity, Electronic Frontier Foundation"A guided tour of the intersection between security and technology by the best kind of storyteller. Mikko lived it, shaped it, and now explains it."--John Lambert, Microsoft"Hypponen has seen a lot in his more than 30-year career in information security. There is much to learn from what he shares and has witnessed. He is a great writer, and if you are smart, you will read this book."--Ben Rothke, Tapad"It's hard to understand a revolution when we are living in the middle of it. Mikko clearly explains the technology megatrends shaping our future and illustrates his points with fascinating real-world stories from his long career in infosec."--Dave DeWalt, Founder of NightDragon and former CEO of McAfee and FireEye/Mandiant"Surprisingly up to date account of the vulnerable world we live in! Mikko is a natural storyteller who draws you into his world."--Charlie Miller, Computer Security Researcher"Mikko uses his remarkable experience to give the reader an understanding of the challenges we as digital citizens face. If It's Smart, It's Vulnerable; no truer words have been said in this digital age."--Raj Samani, Senior Vice President and Chief Scientist at Rapid7"There is nobody out there that is more knowledgeable when it comes to cyber threats in the modern world. Mikko has taken his knowledge and captured it in this book in a fascinating way, making this a must read."--Aki Anastasiou, talk radio host"Before the internet, people were not used to reality having multiple dimensions. Now that the globe is being connected at an exponential pace, we are lucky to have talented guys like Mikko Hypponen explain how we can move to the next step."--Marcelo Tas, Brazilian actor, author and TV host
Foreword: Jeff Moss xiiiPreface xviiSaab 9000 Turbo xxiThe Good and the Bad of the Internet 1Prehistoric Internet 2The First Websites 5Linux Is the World's Most Important System 7iPhone vs. Supercomputer 10Online Communities 11Money Is Data 13Codes All Around Us 14Geopolitics 17Security Tetris 21Who Are We Fighting? 24Schoolboys 24Spammer 26Professional Cybercrime Groups 28Extremists 29The Rolex 30Malware--Then, Now, and in the Near Future 33The History of Malware 34Viruses on Floppies 34Brain.A 35File Viruses 43Macro Viruses 43Email Worms 45Internet Worms 46The Virus Wars 49Web Attacks 51Mobile Phone Viruses 51Worms on Social Media 54Smartphones and Malware 55Law Enforcement Malware 57Case R2D2 58Cracking Passwords 59When a Hacker Spilled Her Coffee 60Ransomware Trojans 61The History of Ransomware Trojans 61Cryptolocker 64Honest Criminals 65Notpetya 65Case Maersk 67Wannacry 71My Week with Wannacry 72Targeted Ransomware Trojans 76Ransomware Trojans v2 77The Human Element 79The Two Problems 80The Heist 82CEO Fraud 89Touring the Headquarters 92Protecting Company Networks 95Zero Trust 100Bug Bounties 101Wi- Fi Terms of Use 110Mikko's Tips 112Mikko's Tips for the Startup Entrepreneur 114Boat for Sale 118What If the Network Goes Down? 121Electrical Networks 122Security in Factories 124A Search Engine for Computers 126Slammer 128Hypponen's Law 130Dumb Devices 132Regulation 134Car Software Updates 136Online Privacy 137Life Without Google 138Murder Charges Never Expire 139Is Google Listening to You? 142Gorillas 143Startup Business Logic 145Biometrics 147Antisocial Media 149Online Influencing and Elections 151Privacy Is Dead 153Before and After Gmail 156Encryption Techniques 160Perfect Encryption 160Unbreakable Encryption 161Criminal Use of Encryption Systems 162Data Is The New Uranium 166CASE Vastaamo 168Patient Registry 169Technologies 170Vastaamo.tar 171Extortion Messages 173The Hunt for the TAR File 175Innocent Victims 177Cryptocurrencies 179The Value of Money 180Blockchains 181Blockchain Applications 182Blockchains and Money 183The Environmental Impacts of Bitcoin 185Playing the Market 187Ethereum, Monero, and Zcash 189Nft 191Bitcoin and Crime 193Border Guards vs. Bitcoin 195Technology, Espionage, and Warfare Online 199Cyberweapons 200Lunch Break at Google 201Technology and Warfare 202Under a False Flag 204Concealability of Cyberweapons 205The Fog of Cyberwar 207Case Prykarpattyaoblenergo 211Case Pyeongchang 213Governments as Malware Authors 214Russia and China 216Case Stuxnet 217Damage Coverage 226Explosion at the White House 227My Boycott of RSA, Inc 229The Future 233Artificial Intelligence 234Wolverines 237AI Will Take Our Jobs 238Smart Malware 239Metaverse 240The Technology of Warfare 241"You Are Under Arrest for a Future Murder" 242Those Who Can Adapt Will Prosper 243Tesla 245Trends in Technology 247Coda 249Index 251
MIKKO HYPPONEN is a global cyber security expert with over thirty years' experience working as a researcher and investigator. He is a sought-after lecturer, and he was profiled in Vanity Fair. His TED Talk has been viewed more than 2 million times.
1997-2026 DolnySlask.com Agencja Internetowa





