Fancy Bear Goes Phishing

The Dark History of the Information Age, in Five Extraordinary Hacks

English language

Published April 9, 2023 by Farrar, Straus & Giroux.

ISBN:
978-0-374-60117-1
Copied ISBN!

View on OpenLibrary

4 stars (1 review)

Fancy Bear Goes Phishing is an entertaining account of the philosophy and technology of hacking—and why we all need to understand it.

It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian “Dark Avenger,” who invented the first mutating …

1 edition

The dark side of the information age in five extraordinary hacks

4 stars

Em português → sol2070.in/2023/07/O-lado-escuro-da-era-da-informa%C3%A7%C3%A3o-em-cinco-hacks-extraordin%C3%A1rios

That is the subtitle of the non-fiction book "Fancy Bear Goes Phishing" (2023) by Scott J. Shapiro. It's a fairly accurate description of the content. This "dark side" refers more to the fragility and vulnerabilities of information systems, which end up allowing the most varied types of hacking, but the dark world of varied types of hackers is also well portrayed, even in the most internal aspects, such as motivations and resentments, with a lot of dialogue with the work of researchers who studied this in depth.

The author is a professor of law and philosophy, but also shows himself to be a genuine computer geek. In addition to his familiarity with the subject since his youth, he has delved deeper into the topic of digital security in preparation for this book. So there is no shortage of technical details of the intrusions portrayed and, due …