-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Narrated by: Joe Ochman
- Length: 13 hrs
- Categories: Computers & Technology, History & Culture
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Audible Premium Plus
$14.95 a month
Buy for $31.50
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it. In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
My favorite non-fiction book!
- By Philip Lowe on 08-28-20
By: Cliff Stoll
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
We Are Anonymous
- Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
- By: Parmy Olson
- Narrated by: Abby Craden
- Length: 14 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
In late 2010, thousands of hacktivists joined a mass digital assault by Anonymous on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Splinter groups then infiltrated the networks of totalitarian governments in Libya and Tunisia, and an elite team of six people calling themselves LulzSec attacked the FBI, CIA, and Sony. They were flippant and taunting, grabbed headlines, and amassed more than a quarter of a million Twitter followers.
-
-
Interesting book, AWFUL narration
- By Jen on 11-11-14
By: Parmy Olson
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- By Eugene on 08-08-20
By: Richard A. Clarke, and others
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it. In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
My favorite non-fiction book!
- By Philip Lowe on 08-28-20
By: Cliff Stoll
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
We Are Anonymous
- Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
- By: Parmy Olson
- Narrated by: Abby Craden
- Length: 14 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
In late 2010, thousands of hacktivists joined a mass digital assault by Anonymous on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Splinter groups then infiltrated the networks of totalitarian governments in Libya and Tunisia, and an elite team of six people calling themselves LulzSec attacked the FBI, CIA, and Sony. They were flippant and taunting, grabbed headlines, and amassed more than a quarter of a million Twitter followers.
-
-
Interesting book, AWFUL narration
- By Jen on 11-11-14
By: Parmy Olson
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- By Eugene on 08-08-20
By: Richard A. Clarke, and others
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
BY FAR the best book to date on this topic!
- By aaron on 07-09-18
By: David E. Sanger
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
A must read for any one in the cybersecurity indus
- By Abdelrahman Samy on 10-07-20
By: Kevin Mitnick
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
Great listen for tech fans
- By Mikeyxote on 06-01-12
By: Kevin Mitnick, and others
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
Outstanding
- By Mark on 02-27-17
By: P. W. Singer, and others
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- By: Brian Krebs
- Narrated by: Christopher Lane
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
-
-
Risky topic, but Br. Krebs hits it out of the park
- By RRiley on 12-21-14
By: Brian Krebs
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- By: Christian Brose
- Narrated by: Christian Brose
- Length: 9 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network" - the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- By Tomas Singliar on 06-06-20
By: Christian Brose
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
Interesting & knowledgeable but lacks captivation
- By WT on 04-04-15
By: Kevin Poulsen
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Cyberspies
- The Secret History of Surveillance, Hacking, and Digital Espionage
- By: Gordon Corera
- Narrated by: Gildart Jackson
- Length: 17 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
As the digital era becomes increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all. Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the Internet to the present era of hackers and surveillance. The book is rich with historical detail and characters as well as astonishing revelations about espionage carried out in recent times by the United Kingdom, the United States, and China.
-
-
One in a Million
- By CJA on 10-15-16
By: Gordon Corera
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Curious
- The Desire to Know and Why Your Future Depends on It
- By: Ian Leslie
- Narrated by: Sean Runnette
- Length: 7 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
We've come to misunderstand curiosity, mistaking diversive curiosity, our attraction to novel stimuli, as the real thing. This leaves us floundering in a world of Angry Birds, live tweeting, and fleeting, click-through distractions. Leslie shows how these distractions have led to a decline in deep, sustained quests for knowledge and understanding - what he calls epistemic curiosity - which relies on effort and persistence, and empathic curiosity, which leads us to wonder about the thoughts and feelings of others.
-
-
Fantastic book with a very modest title
- By Dmitriy on 12-19-14
By: Ian Leslie
Publisher's Summary
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery - apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility.
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran - and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
But Countdown to Zero Day ranges far beyond Stuxnet itself.
Critic Reviews
What listeners say about Countdown to Zero Day
Reviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Scott
- 12-21-14
Engrossing cyber whodunit
What did you love best about Countdown to Zero Day?
This is an utterly engrossing true life tale of the coders who unraveled the where when's and how's of the Stuxnet virus. Part cyber detective story, part geopolitical thriller, Countdown to Zero Day deftly takes the listener through the efforts of a small group of private cybersecurity experts who stumbled upon the virus and through dogged effort began to unravel its components to discover its true purpose. Wisely, the author reveals this piecemeal, mirroring the experiences of the cyber sleuths as they slowly crack the multidimensional virus. There are no big or juicy revelations here - anyone who has followed Iran's efforts to acquire nuclear weapons technology will have heard about Stuxnet and the alleged role the US and Israel played in it. Rather, Countdown intrigues in an All the President's Men sort of way - how intrepid doggedness on the part of ordinary people (substitute coders for reporter) can uncover the darkest and most hidden reaches of power.
5 people found this helpful
-
Overall
-
Performance
-
Story
- John Tangney
- 03-01-20
Overzealous editing and lifeless reading
Joe! Ochman! likes! to end every! few! words! with an exclamation! This makes listening! to him very! very! tiresome! I'll skip over his mispronunciation of names and uncommon English words. Now, the book. Ms. Zetter put together an incredible and horrifying account of the deployment, discovery, reverse-engineering, and aftermath of Stuxnet. I found her political analysis to be very, very good — not surprising, given her background and experience. It left more informed, and yes, more uneasy about the world we live in. The book was marred by what appears to be an overzealous editing process. Some common technical terms and concepts are explained in unnecessary depth (complete with tortuous, eye-rolling analogies,) while less common terms are used without explanation. I have a feeling that the over-explanations were added after the fact, perhaps by a nervous editor? The book most definitely does not need them, and anyone who is reading a book about Stuxnet can be assumed to have a basic grasp of what, e.g., a worm is.
1 person found this helpful
-
Overall
-
Performance
-
Story
- Nicolas Gutierrez
- 12-21-14
WOW! It will open your eyes
Would you recommend this audiobook to a friend? If so, why?
Yes! specially now that the Sony hacked is in the news!
Most of us are blind to the back door of all the things we do online. This books explains how mayor hacks are possible and how easy they can take place.
Was this a book you wanted to listen to all in one sitting?
Yes!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Baumerx20
- 05-02-15
Interesting Story, Terrible Production Quality
Would you recommend this audiobook to a friend? If so, why?
No. I would recommend the physical book, but not the audio book. It is terribly produced.
What did you like best about this story?
The story presented a speculated account of the Stuxnet virus and the first time the United States has ever used a digital weapon against a country. Note the US has not publicy acknowledged credit for this attack however based on the accounts of a variety of sources the author explains in excellent detail, the events surrounding this attack.
What didn’t you like about Joe Ochman’s performance?
It wasn't Joe's performance that was bad. It was the Production team who produced the book, and some of the decisions they made. First the reading of a book very obviously written by a woman by a male reader was kind of an odd choice. If you read or listen to a lot of books you can usually distinguish writing styles and descriptions which can be very distinctly male or female. There are points in the book where Kim, the author pretty much gushes over one of her sources, Ralph Langner. The way she describes him as a rock star and how he is portrayed in the book comes across a little silly when read by a man. Not to say that males don't gush over other males, but knowing this book was written by a woman makes it odd. I swear you can hear Joe(the reader) smile during some of these descriptions and phrases.Second the use of Acronyms in audio books is difficult. This book uses a TON of acronyms and in a physical book it is ok to define the acronym once then use the acronym letters for the rest of the book. However in an audio book it sounds ridiculous and is terrible to the point of laughing out loud, to skipping ahead, to uncomfortably struggling to listen to. That and if you don't listen to the book in one sitting you have no idea what the acronym stands for anymore. Good producers know how to assist in creating continuity by either spelling out the acronym each time, which is ok or working with the author to augment the book for an audio book reading. This comes across as lazy and unbearable at points.
What’s the most interesting tidbit you’ve picked up from this book?
The whole book was very interesting. Kim takes a very technical topic and provides an insight to a topic that normal or non technical people can understand.
Any additional comments?
Overall the book was very good and I recommend reading it in place of listening as this audio book was not produced very well.
8 people found this helpful
-
Overall
-
Performance
-
Story
- Greg
- 11-22-14
Amazingly detailed, sober and above all, damning
Digital warfare generally conjures up bad science fiction imagery and seems more fanciful fiction than reality... However, that changed when Stuxnet was discovered, a carefully multiple pronged attack against Iran's secretive nuclear weapons program.
"Countdown to Zero Day" chronicles the discovery Stuxnet from its origins in Belarus, and follows the painstakingly detailed researched conduncted by a truly international cast, from Symantec researchers in the United States, Kaspersky Labs in Russia and security firms in India.
Kim Zetter carefully introduces the mystery of who wrote the Stuxnet virus and takes plenty of intermissions to explain the instability and insecurity of industrial control systems, and the very real threats they yield, as told by real world incidents, controlled tests and government experts assessment.
The book is measured, and isn't written as a fear-mongering piece, advocating more security but rather how the United States rushed head first into a new domain of espionage and war without ever fully considering the ramifications. It's painfully damning George Bush Jr and Barrack Obama's administrations.
Joe Ochman is almost a non-entity, transparently blending into the content and I mean this as a positive. I barely registered him as I was lost within the content. He's exceptionally easy to listen to, and never distracting. For a book that requires mostly narration, he's a great match.
Kim Zetter is extremely versed in his technology, and painstakingly details each major reveal in the case of Stuxnet as a hodgepodge of global researchers chase the rabbit continually further down the hole.Zetter isn't afraid to critique, often using quotes between security firms and government representatives to express the problematic nature of our digital platform. Towards the end, Zetter quotes and deconstructs the mantra, NOBUS (Nobody but us) used by the NSA, as an inherently flawed and naive view of cyber-security. Essentially, the inaction of government agencies to report weaknesses, flaws and glitches to save as a goodie bag for the United States puts everyone at risk as its arrogant to assume the United States will be the only ones who can use an exploit, and the "digital missiles" can be caught, deconstructed and fired back. In digital warfare.
Having read, Mark Bowden's Worm, about Conficker, Zetter avoids pandering and cuts into the technical aspects without apology. It's sure to alienate less technical readers. Those unfamiliar with patch Tuesday and the significance of out-of-band updates from Microsoft, or even what a zero-day exploit is, may want to start with Worm as a primer.
This book isn't for everyone due to the technical nature of it. I could easily see an average reader getting lost or eyes glazing over at times. As someone who's livelihood is tied web development, and followed stuxnet in the news, this book is fascinating. I remember clearly being blown away when the MD5 collision attack was discovered as it essentially confirmed that Stuxnet was made by nation-state actors.
In the end, it's wild ride, stranger than fiction journey that involves international conspiracies, assassinations, wildly intelligent researchers across the entire globe. By the end, while you never learn who the faces are behind Stuxnet, you'll have zero doubts about which nations were behind it.
11 people found this helpful
-
Overall
-
Performance
-
Story
- Mark
- 11-06-20
Detailed look at computer virus
Fast moving detail packed exploration of stucksnet and related trojan/malware software. Finally diving into origins and motivations for creation.
-
Overall
- Natrix
- 10-30-20
Great information
The book was great. It contains very relevant and interesting information on cyber weapons. I highly recommend listening.
-
Overall
-
Performance
-
Story
- DOS
- 09-25-20
Stuxnet - The beginning of Cyber Warfare
What an incredibly book not only for IT related people, also for everyone with the exact amount of curiosity. The order of the book, the deep of the investigation well deserves investing your money on it. Great work Kim Zetter! Hope I could see more of your work with this level of quality. Also the clear performance of Joe Ochman is great for listen from a non native English speaker.
-
Overall
-
Performance
-
Story
- Kristofer Jarl
- 09-17-20
Well researched, well told
I enjoyed this book more than I thought I would. It is very well researched, and it covers a vast landscape. It contains deep dives into technical, political, military, historical, personal and psychological aspects, and most of them are well covered. I'm from a technical background, and I'm surprised that it contained such thorough coverage of how a virus and digital vulnerabilities work. But I also think that the research and presentation of the political and military facets were equally impressive. This makes the book an exciting read for most people, technically inclined or not.
-
Overall
-
Performance
-
Story
- Ivan
- 08-07-20
A must read for cybersecurity
Its a great book and shows how cybersecurity now can affect different aspects of life and how we need to protect them, now the map has changed a lot and we need to be are of it. It's a great book if you want to know about the first cyber weapon (Stuxnet)
-
Overall
-
Performance
-
Story

- Just little old me
- 04-01-15
Fascinating subject and an amazing story
Well researched, probably bit too much detail for me, but a wake up call if ever there was one. Makes me want to run to the hills .. It's so hard to build 'safe' connected systems. Started listening to security now on twit.tv to try to keep up with the latest what is going on. Any IT person should read/listen to this book and think very hard about what they are doing and how to protect themselves.
3 people found this helpful
-
Overall
-
Performance
-
Story

- Nick
- 04-18-15
Intriguing story - well told!
An interesting contemporary subject well researched and told. Great level of detail that doesn't distract the listener from the main context of the story. I enjoyed it very much
2 people found this helpful
-
Overall
-
Performance
-
Story

- Matt Jackson
- 05-06-15
Intriguing from the first minute
Where does Countdown to Zero Day rank among all the audiobooks you’ve listened to so far?
Hanging off every word for the whole duration, perfectly delivered.
What did you like best about this story?
The way it tells you the accounts from various perspectives helps you get a worldwide view of the story as it goes along.
Have you listened to any of Joe Ochman’s other performances? How does this one compare?
Never.
Was there a moment in the book that particularly moved you?
No.
1 person found this helpful
-
Overall
-
Performance
-
Story

- R D Droy
- 12-31-14
Scary but informative
This book was brilliant. It reads like a thriller but is the true story of the first cyber warfare attack on Iran. Detailed and meticulous research is coupled with a real understanding of the wider political context of the age. There are some highly technical chapters but I got used to the jargon fairly quickly and didn't worry too much if I didn't understand every aspect of the computing systems.
Narrated in a factual way, clear and at a reasonable pace..
Learnt a great deal by reading this book and will take more notice of virus attacks in the future.
1 person found this helpful
-
Overall
-
Performance
-
Story

- MR C K GRAHAM
- 01-02-21
The only 'known' cyberattack, as of writing
I liked how it started, how it described the computational thinking behind the worn. You actually don't even need be tech minded to grasp this. So for me the book has three main focuses: the worm, the team that cracked it, international laws. The international laws part seemed to drag on a bit, but was still necessary to the story.
-
Overall
-
Performance
-
Story

- Kris Als
- 12-17-20
brilliant, well researched and narrated book
Really well researched, thought through and insightful book about a watershed moment in cyber security and cyber warfare: "Stuxnet". highly recommend it to anyone interested in information security and the world order!
-
Overall
-
Performance
-
Story

- AS
- 11-18-20
Good book, but a bit too long
Provides a lot of info, but sometimes dives too much and I failed to see the relevance. Otherwise, pretty interesting. Reader absolutely ok.
-
Overall
-
Performance
-
Story

- Amazon Customer
- 10-06-20
From a cyber security professional (me): This is the real deal
All listeners will enjoy this, and especially those listeners like myself which work on the technical side of cyber security. This book also fulfills my other main interests, the history and use of espionage, diplomacy and international law. I can recommend this even to the most educated listeners in either realm of knowledge as I can promise you that you will learn something about the other half of this amazing true story.
-
Overall
-
Performance
-
Story

- Greeny
- 07-20-20
I couldn’t stop listening!
Countdown to Zero Day explores so much more of the fascinating world of cyber warfare than I was expecting. The story of Stuxnet forms the backbone of the story, but this book sheds light on both the technical details and politics surrounding it.
-
Overall
-
Performance
-
Story

- Yuri Meiran
- 05-18-20
Good.. For the most part.. But recommended
No issues with narrator. The book itself was very interesting for the most part. However, towards the end I really struggled to listen to it. It was either totally unnecessary information or it went too much in detail or just was repetitive. Overall I really enjoyed listening it. Bunch of very interesting information, and very disturbing at the same time. It makes you think how fragile is our online world, and how easy cyber attack can make damage to real people and things. Not sure it's worth spending 20£ or 25$ if buy it for cash, but if you get it for Audible credit - 100% worth getting.
-
Overall
-
Performance
-
Story

- Jason
- 05-20-17
A Thrilling Eye-Opener
Although we all know about computer viruses, few of us have much of an understanding of how much of a role cyber-warfare plays in international espionage and sabotage.
Countdown to Zero Day does a great job in enlightening us about all levels of cyber attack and defence, focussing on the extraordinary Stuxnet attack interwoven with countless other examples.
With a good balance between intrigue and technical detail, it held my attention the whole time. Well written and well read.
3 people found this helpful
-
Overall
-
Performance
-
Story

- Anonymous User
- 09-11-20
Great detail - not too technical
Excellent technical analysis of Stuxnet as well as the enabling operations that ensured its success.
-
Overall
-
Performance
-
Story

- Anonymous User
- 01-29-19
Brilliant recap of the political and tech aspects
Brilliant recap of the political and the technological aspects of stuxnet and the teams behind it