Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. 
 
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.

---

Uma explicação detalhada de como o vírus Stuxnet alcançou sua sabotagem – e como seu funcionamento serviu de “prova de conceito” para potenciais ataques contra sistemas críticos nos Estados Unidos e em outros lugares

---

Por que os sistemas por trás de nossas redes de energia, oleodutos, barragens e usinas nucleares são vulneráveis a ataques no estilo do Stuxnet – e uma visão do que está (e não está) sendo feito para resolver essas deficiências

---

Como os Estados Unidos e Israel desenvolveram e desencadearam o Stuxnet, incluindo novas informações sobre a linha do tempo por trás de seu desenvolvimento, as pesquisas secretas e os testes envolvidos, e os computadores que propagaram o ataque

---

Novos detalhes sobre como o Stuxnet foi descoberto e a história da corrida realizada por pesquisadores de segurança ao redor do mundo para decifrá-lo

---

Uma visão da história e do desenvolvimento de armas digitais e das capacidades ofensivas dos Estados Unidos

---

Novos detalhes sobre a instalação nuclear iraniana onde as centrífugas foram atingidas e como a sua existência foi exposta pela primeira vez

---

A evidência de que o Stuxnet era apenas um de um arsenal de ferramentas sofisticadas que seus criadores lançaram pelo mundo, incluindo os programas espiões digitais conhecidos como Flame e Duqu

---

Uma viagem pelo mercado cinza, onde agências de inteligência e militares estão se armando com armas digitais e ferramentas de espionagem necessárias para realizar futuros atos de guerra cibernética

---

“Parte história de detetive, parte um brilhante tratado sobre o futuro da guerra... um livro ambicioso, abrangente e cativante que deveria ser lido por qualquer um que se preocupa com as ameaças que os Estados Unidos – e o mundo – enfrentarão nos próximos anos.” – Kevin Mitnick, autor dos best-sellers do NY Times “Ghost in the Wires” e “The Art of Intrusion”

---

Em janeiro de 2010, inspetores da Agência Internacional de Energia Atômica perceberam que centrífugas nas usinas iranianas de enriquecimento de urânio estavam falhando a taxas sem precedentes. A causa era um mistério completo.

Cinco meses depois, um evento aparentemente não relacionado ocorre: uma empresa de segurança na Bielorrúsia é acionada para resolver problemas em computadores no Irã que estavam travando e reiniciando repetidamente.

No início, os programadores da empresa acreditavam que o código malicioso identificado nas máquinas era um simples e rotineiro malware. No entanto, à medida que eles e outros especialistas ao redor do mundo investigavam, era descoberto um vírus misterioso e de incomparável complexidade.

Logo descobriram que tinham tropeçado no primeiro exemplo mundial de arma digital. O Stuxnet – como passou a ser conhecido – era diferente de qualquer vírus ou worm anteriormente construído: em vez de sequestrar os computadores ou roubar informações, o Stuxnet causava destruição física real.

Aqui, a jornalista da Wired Kim Zetter se baseia em suas inúmeras fontes e extensa expertise para contar a história por trás do Stuxnet – narrando uma espetacular e improvável história de geeks de segurança que desvendaram uma campanha de sabotagem com anos de duração.

Mas “Contagem Regresiva até Zero Day” abrange muito mais que o Stuxnet. Zetter nos mostra como a guerra digital se desenvolveu nos Estados Unidos. Ela nos leva para dentro do próspero “mercado cinza” de exploits zero-day, onde agências de inteligência e militares pagam enormes quantias em troca dos códigos maliciosos de que precisam para conduzir infiltrações e ataques. Ela revela o quão vulneráveis podem ser muitos dos nossos sistemas críticos face a ações semelhantes à do Stuxnet, partindo de atacantes anônimos ou nações-estado – e nos mostra o que pode acontecer caso nossa infraestrutura seja atingida por um ataque assim.

 Impulsionado pelo conhecimento e acesso únicos de Zetter, e cheio de explanações esclarecedoras a respeito das tecnologias envolvidas, “Contagem Regressiva até Zero Day” é um retrato abrangente e visionário de um mundo à beira de um novo tipo de guerra. 

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. 
 
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.
©2019 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.