Fancy Bear Goes Phishing cover art

Fancy Bear Goes Phishing

The Dark History of the Information Age, in Five Extraordinary Hacks

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

Fancy Bear Goes Phishing

By: Scott Shapiro
Narrated by: Jonathan Todd Ross
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £12.99

Buy Now for £12.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

Brought to you by Penguin.

It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott Shapiro exposes the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human story, he tells the fascinating tales of perpetrators including Robert Morris Jr, the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian 'Dark Avenger' who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone and the Russian intelligence officers who sought to take control of a US election, among others.

In telling their stories, Shapiro exposes the hackers' tool kits and gives fresh answers to vital questions: why is the internet so vulnerable? What can we do in response? The result is a lively and original account of the future of hacking, espionage and war, and of how to live in an era of cybercrime.

©2023 Scott Shapiro (P)2023 Penguin Audio
Freedom & Security Security & Encryption Technology & Society True Crime Espionage Computer Security Hacking Internet Software Cyber warfare War
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

Sandworm cover art
The Ransomware Hunting Team cover art
How I Rob Banks cover art
The Lazarus Heist cover art
The Cuckoo's Egg cover art
If It's Smart, It's Vulnerable cover art
Listening In cover art
The Everything Blueprint cover art
Crime Dot Com cover art
Tor and the Dark Net cover art
Countdown to Zero Day cover art
A Vulnerable System cover art
A Hacker's Mind cover art
Conspirituality cover art
We Have Root cover art
Homegrown cover art

Critic reviews

Shapiro's snappy prose manages the extraordinary feat of describing hackers' intricate coding tactics and the flaws they exploit in a way that is accessible and captivating even to readers who don't know Python from JavaScript. The result is a fascinating look at the anarchic side of cyberspace. (Publishers Weekly)
Scott Shapiro's Fancy Bear Goes Phishing fills a critical hole in cybersecurity history, providing an engaging read that explains just why the internet is as vulnerable as it is. Accessible for regular readers, yet still fun for experts, this delightful book expertly traces the challenge of securing our digital lives and how the optimism of the internet's early pioneers has resulted in an online world today threatened by spies, criminals, and over-eager teen hackers. (Garrett Graff, co-author of The Dawn of the Code War)
The question of trust is increasingly central to computing, and in turn to our world at large. Fancy Bear Goes Phishing offers a whirlwind history of cybersecurity and its many open problems that makes for unsettling, absolutely riveting, and-for better or worse-necessary reading. (Brian Christian, author of Algorithms to Live By and The Alignment Problem)

What listeners say about Fancy Bear Goes Phishing

Average customer ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    28
  • 4 Stars
    2
  • 3 Stars
    3
  • 2 Stars
    1
  • 1 Stars
    0
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    25
  • 4 Stars
    4
  • 3 Stars
    1
  • 2 Stars
    1
  • 1 Stars
    0
Story
  • 4.5 out of 5 stars
  • 5 Stars
    22
  • 4 Stars
    6
  • 3 Stars
    3
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars

Interesting and exploits explained

Good to hear some exploits explained. Although tends to be the basic ones, like buffer overflow. The relentless mentioning of upcode and downcode gets annoying though.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars

Turned My Vague Concern about Data Security Into Something Really Tangible and Useful

I felt that I learnt so much without having to sweat over too many technicalities (though my background did include Assembler programming) There was a run of chapters from Kill Chain to the Attack of the Killer Toasters where I couldn’t put the book down. On the downside, I couldn’t see where it was going for the first few chapters and the conclusion seemed a bit esoteric. But it was so good that I bought a paper copy for a friend and I plan to listen to the middle chapters again to help me make some changes to the way I do things.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great overview

Even though this is all stuff I am very familiar with I still found it useful set into such a connection and overview. Great telling and always good with a repeat for us who knows.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Excellent

A fantastic history of cyber security and hacking. Narrated very well and always interesting. I even went back over a few things for my own understanding and research. overall - excellent.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Fascinating history of hacking’s past and a view to its future

Cyber breaches are older than most think. This book is an entertaining education of its history and what is to come. Enjoyed the reading voice too.




Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    3 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    3 out of 5 stars

If you have tech knowledge you'll be fine

I learnt a lot listening to this. I found the history of how the internet and operating systems developed through the stories of the early hacks fascinating. The concept of upcode versus down code was also new to me and thought provoking. However, I did get lost later in the book which was down to my lack of knowledge rather than a failure of the author.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    3 out of 5 stars
  • Performance
    3 out of 5 stars
  • Story
    3 out of 5 stars

Fancy bear for beginners Not Much Depth

Again, this book doesn’t go into much depth about how cybersecurity works or how it can be used. Instead, it’s a collection of stories about cybersecurity with very easy explanations of how things can work. Don’t expect a deep dive into the technology’s story. It’s okay but not great, in my opinion, though I seem to be in the minority.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    3 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    3 out of 5 stars

I wanted to like this but…

…it was just a bit heavy going. Reading out code rather than having a PDF attachment to look at, inventing own terms like vorms and wiruses, all added up to a disappointing experience. If you haven’t read/listened to This Is How They Tell Me The World Ends, that is vastly better.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!