Fancy Bear Goes Phishing

The Dark History of the Information Age, in Five Extraordinary Hacks

No cover

Scott J. Shapiro: Fancy Bear Goes Phishing (2023, Farrar, Straus & Giroux)

English language

Published May 27, 2023 by Farrar, Straus & Giroux.

ISBN:
978-0-374-60118-8
Copied ISBN!

View on OpenLibrary

4 stars (2 reviews)

2 editions

Insightful Book That Helps Put the Humanity into Cybersecurity

4 stars

Cybersecurity is my job, so I came into this book with some amount of knowledge of the subject, but I still found it a fascinating read.

At first, I was slightly annoyed that Shapiro was making up new words (downcode, upcode, metacode) to describe things we already have word for in the industry, but as I read the book I started to see why he's using these words.

Shapiro does a great job of using the ideas of downcode (what you might consider regular computer code), upcode (generally the ethics or rules that the computer user has), and metacode (the rules that exist "above" the user, such as laws). By defining these three ideas, Shapiro makes the case that cybersecurity is not a technology problem at all, but rather a human problem.

This idea is something that I've tried to instill in others at my day job, but it is …

The dark side of the information age in five extraordinary hacks

4 stars

Em português → sol2070.in/2023/07/O-lado-escuro-da-era-da-informa%C3%A7%C3%A3o-em-cinco-hacks-extraordin%C3%A1rios

That is the subtitle of the non-fiction book "Fancy Bear Goes Phishing" (2023) by Scott J. Shapiro. It's a fairly accurate description of the content. This "dark side" refers more to the fragility and vulnerabilities of information systems, which end up allowing the most varied types of hacking, but the dark world of varied types of hackers is also well portrayed, even in the most internal aspects, such as motivations and resentments, with a lot of dialogue with the work of researchers who studied this in depth.

The author is a professor of law and philosophy, but also shows himself to be a genuine computer geek. In addition to his familiarity with the subject since his youth, he has delved deeper into the topic of digital security in preparation for this book. So there is no shortage of technical details of the intrusions portrayed and, due …