+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

If It's Smart, It's Vulnerable. Edition No. 1

  • Book

  • 288 Pages
  • August 2022
  • John Wiley and Sons Ltd
  • ID: 5836335
Reimagine the future of the internet

All our devices and gadgets - from our refrigerators to our home security systems, vacuum cleaners, and stereos - are going online, just like our computers did. But once we’ve successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters?

In If It’s Smart, It’s Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best - and worst - things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more.

Readers will also find: - Insightful discussions of how law enforcement and intelligence agencies operate on the internet - Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology - Explorations of how the internet has changed the world, for better and for worse - Engaging stories from Mikko's 30-year career in infosec

Perfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It’s Smart, It’s Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.

Table of Contents

Foreword: Jeff Moss xiii

Preface xvii

Saab 9000 Turbo xxi

The Good and the Bad of the Internet 1

Prehistoric Internet 2

The First Websites 5

Linux Is the World’s Most Important System 7

iPhone vs. Supercomputer 10

Online Communities 11

Money Is Data 13

Codes All Around Us 14

Geopolitics 17

Security Tetris 21

Who Are We Fighting? 24

Schoolboys 24

Spammer 26

Professional Cybercrime Groups 28

Extremists 29

The Rolex 30

Malware - Then, Now, and in the Near Future 33

The History of Malware 34

Viruses on Floppies 34

Brain.A 35

File Viruses 43

Macro Viruses 43

Email Worms 45

Internet Worms 46

The Virus Wars 49

Web Attacks 51

Mobile Phone Viruses 51

Worms on Social Media 54

Smartphones and Malware 55

Law Enforcement Malware 57

Case R2D2 58

Cracking Passwords 59

When a Hacker Spilled Her Coffee 60

Ransomware Trojans 61

The History of Ransomware Trojans 61

Cryptolocker 64

Honest Criminals 65

Notpetya 65

Case Maersk 67

Wannacry 71

My Week with Wannacry 72

Targeted Ransomware Trojans 76

Ransomware Trojans v2 77

The Human Element 79

The Two Problems 80

The Heist 82

CEO Fraud 89

Touring the Headquarters 92

Protecting Company Networks 95

Zero Trust 100

Bug Bounties 101

Wi- Fi Terms of Use 110

Mikko’s Tips 112

Mikko’s Tips for the Startup Entrepreneur 114

Boat for Sale 118

What If the Network Goes Down? 121

Electrical Networks 122

Security in Factories 124

A Search Engine for Computers 126

Slammer 128

Hypponen’s Law 130

Dumb Devices 132

Regulation 134

Car Software Updates 136

Online Privacy 137

Life Without Google 138

Murder Charges Never Expire 139

Is Google Listening to You? 142

Gorillas 143

Startup Business Logic 145

Biometrics 147

Antisocial Media 149

Online Influencing and Elections 151

Privacy Is Dead 153

Before and After Gmail 156

Encryption Techniques 160

Perfect Encryption 160

Unbreakable Encryption 161

Criminal Use of Encryption Systems 162

Data Is The New Uranium 166

CASE Vastaamo 168

Patient Registry 169

Technologies 170

Vastaamo.tar 171

Extortion Messages 173

The Hunt for the TAR File 175

Innocent Victims 177

Cryptocurrencies 179

The Value of Money 180

Blockchains 181

Blockchain Applications 182

Blockchains and Money 183

The Environmental Impacts of Bitcoin 185

Playing the Market 187

Ethereum, Monero, and Zcash 189

Nft 191

Bitcoin and Crime 193

Border Guards vs. Bitcoin 195

Technology, Espionage, and Warfare Online 199

Cyberweapons 200

Lunch Break at Google 201

Technology and Warfare 202

Under a False Flag 204

Concealability of Cyberweapons 205

The Fog of Cyberwar 207

Case Prykarpattyaoblenergo 211

Case Pyeongchang 213

Governments as Malware Authors 214

Russia and China 216

Case Stuxnet 217

Damage Coverage 226

Explosion at the White House 227

My Boycott of RSA, Inc 229

The Future 233

Artificial Intelligence 234

Wolverines 237

AI Will Take Our Jobs 238

Smart Malware 239

Metaverse 240

The Technology of Warfare 241

“You Are Under Arrest for a Future Murder” 242

Those Who Can Adapt Will Prosper 243

Tesla 245

Trends in Technology 247

Coda 249

Index 251

Authors

Mikko Hyppönen