-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Narrated by: Joe Ochman
- Length: 13 hrs
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed

Get 2 free audiobooks during trial.
Buy for $20.25
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- By: Amy B. Zegart
- Narrated by: Amy B. Zegart
- Length: 11 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- By Cameron on 02-01-22
By: Amy B. Zegart
-
Permanent Record
- By: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- By Ryan L on 09-22-19
By: Edward Snowden
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- By: Christian Brose
- Narrated by: Christian Brose
- Length: 9 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network"—the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- By Tomas Singliar on 06-06-20
By: Christian Brose
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- By: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrated by: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Length: 12 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- By Silvershopper on 01-18-23
By: Laurent Richard, and others
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- By: Geoff White
- Narrated by: Geoff White
- Length: 8 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
Propagandistic tone
- By Philippe Delteil on 04-17-23
By: Geoff White
-
We Are Anonymous
- Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
- By: Parmy Olson
- Narrated by: Abby Craden
- Length: 14 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
In late 2010, thousands of hacktivists joined a mass digital assault by Anonymous on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Splinter groups then infiltrated the networks of totalitarian governments in Libya and Tunisia, and an elite team of six people calling themselves LulzSec attacked the FBI, CIA, and Sony. They were flippant and taunting, grabbed headlines, and amassed more than a quarter of a million Twitter followers.
-
-
Interesting book, AWFUL narration
- By Jen on 11-11-14
By: Parmy Olson
-
Superintelligence
- Paths, Dangers, Strategies
- By: Nick Bostrom
- Narrated by: Napoleon Ryan
- Length: 14 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- By Gary on 09-12-14
By: Nick Bostrom
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
Publisher's summary
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
“Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
In these chapters, journalist Kim Zetter tells the whole story behind the world’s first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making.
But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.
Critic reviews
“An authoritative account of Stuxnet’s spread and discovery . . . [delivers] a sobering message about the vulnerability of the systems—train lines, water-treatment plants, electricity grids—that make modern life possible.”—Economist
“Exhaustively researched . . . Zetter gives a full account of this ‘hack of the century,’ as the operation has been called, [but] the book goes well beyond its ostensible subject to offer a hair-raising introduction to the age of cyber warfare.”—The Wall Street Journal
“Part detective story, part scary-brilliant treatise on the future of warfare . . . an ambitious, comprehensive, and engrossing book that should be required reading for anyone who cares about the threats that America—and the world—are sure to be facing over the coming years.”—Kevin Mitnick, New York Times bestselling author of Ghost in the Wires and The Art of Intrusion
What listeners say about Countdown to Zero Day
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Greg
- 11-22-14
Amazingly detailed, sober and above all, damning
Digital warfare generally conjures up bad science fiction imagery and seems more fanciful fiction than reality... However, that changed when Stuxnet was discovered, a carefully multiple pronged attack against Iran's secretive nuclear weapons program.
"Countdown to Zero Day" chronicles the discovery Stuxnet from its origins in Belarus, and follows the painstakingly detailed researched conduncted by a truly international cast, from Symantec researchers in the United States, Kaspersky Labs in Russia and security firms in India.
Kim Zetter carefully introduces the mystery of who wrote the Stuxnet virus and takes plenty of intermissions to explain the instability and insecurity of industrial control systems, and the very real threats they yield, as told by real world incidents, controlled tests and government experts assessment.
The book is measured, and isn't written as a fear-mongering piece, advocating more security but rather how the United States rushed head first into a new domain of espionage and war without ever fully considering the ramifications. It's painfully damning George Bush Jr and Barrack Obama's administrations.
Joe Ochman is almost a non-entity, transparently blending into the content and I mean this as a positive. I barely registered him as I was lost within the content. He's exceptionally easy to listen to, and never distracting. For a book that requires mostly narration, he's a great match.
Kim Zetter is extremely versed in his technology, and painstakingly details each major reveal in the case of Stuxnet as a hodgepodge of global researchers chase the rabbit continually further down the hole.Zetter isn't afraid to critique, often using quotes between security firms and government representatives to express the problematic nature of our digital platform. Towards the end, Zetter quotes and deconstructs the mantra, NOBUS (Nobody but us) used by the NSA, as an inherently flawed and naive view of cyber-security. Essentially, the inaction of government agencies to report weaknesses, flaws and glitches to save as a goodie bag for the United States puts everyone at risk as its arrogant to assume the United States will be the only ones who can use an exploit, and the "digital missiles" can be caught, deconstructed and fired back. In digital warfare.
Having read, Mark Bowden's Worm, about Conficker, Zetter avoids pandering and cuts into the technical aspects without apology. It's sure to alienate less technical readers. Those unfamiliar with patch Tuesday and the significance of out-of-band updates from Microsoft, or even what a zero-day exploit is, may want to start with Worm as a primer.
This book isn't for everyone due to the technical nature of it. I could easily see an average reader getting lost or eyes glazing over at times. As someone who's livelihood is tied web development, and followed stuxnet in the news, this book is fascinating. I remember clearly being blown away when the MD5 collision attack was discovered as it essentially confirmed that Stuxnet was made by nation-state actors.
In the end, it's wild ride, stranger than fiction journey that involves international conspiracies, assassinations, wildly intelligent researchers across the entire globe. By the end, while you never learn who the faces are behind Stuxnet, you'll have zero doubts about which nations were behind it.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
12 people found this helpful
-
Overall
-
Performance
-
Story
- Baumerx20
- 05-02-15
Interesting Story, Terrible Production Quality
Would you recommend this audiobook to a friend? If so, why?
No. I would recommend the physical book, but not the audio book. It is terribly produced.
What did you like best about this story?
The story presented a speculated account of the Stuxnet virus and the first time the United States has ever used a digital weapon against a country. Note the US has not publicy acknowledged credit for this attack however based on the accounts of a variety of sources the author explains in excellent detail, the events surrounding this attack.
What didn’t you like about Joe Ochman’s performance?
It wasn't Joe's performance that was bad. It was the Production team who produced the book, and some of the decisions they made. First the reading of a book very obviously written by a woman by a male reader was kind of an odd choice. If you read or listen to a lot of books you can usually distinguish writing styles and descriptions which can be very distinctly male or female. There are points in the book where Kim, the author pretty much gushes over one of her sources, Ralph Langner. The way she describes him as a rock star and how he is portrayed in the book comes across a little silly when read by a man. Not to say that males don't gush over other males, but knowing this book was written by a woman makes it odd. I swear you can hear Joe(the reader) smile during some of these descriptions and phrases.Second the use of Acronyms in audio books is difficult. This book uses a TON of acronyms and in a physical book it is ok to define the acronym once then use the acronym letters for the rest of the book. However in an audio book it sounds ridiculous and is terrible to the point of laughing out loud, to skipping ahead, to uncomfortably struggling to listen to. That and if you don't listen to the book in one sitting you have no idea what the acronym stands for anymore. Good producers know how to assist in creating continuity by either spelling out the acronym each time, which is ok or working with the author to augment the book for an audio book reading. This comes across as lazy and unbearable at points.
What’s the most interesting tidbit you’ve picked up from this book?
The whole book was very interesting. Kim takes a very technical topic and provides an insight to a topic that normal or non technical people can understand.
Any additional comments?
Overall the book was very good and I recommend reading it in place of listening as this audio book was not produced very well.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
9 people found this helpful
-
Overall
-
Performance
-
Story
- John Tangney
- 03-01-20
Overzealous editing and lifeless reading
Joe! Ochman! likes! to end every! few! words! with an exclamation! This makes listening! to him very! very! tiresome!
I'll skip over his mispronunciation of names and uncommon English words.
Now, the book. Ms. Zetter put together an incredible and horrifying account of the deployment, discovery, reverse-engineering, and aftermath of Stuxnet. I found her political analysis to be very, very good — not surprising, given her background and experience. It left more informed, and yes, more uneasy about the world we live in.
The book was marred by what appears to be an overzealous editing process. Some common technical terms and concepts are explained in unnecessary depth (complete with tortuous, eye-rolling analogies,) while less common terms are used without explanation. I have a feeling that the over-explanations were added after the fact, perhaps by a nervous editor? The book most definitely does not need them, and anyone who is reading a book about Stuxnet can be assumed to have a basic grasp of what, e.g., a worm is.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
7 people found this helpful
-
Overall
-
Performance
-
Story
- Scott
- 12-21-14
Engrossing cyber whodunit
What did you love best about Countdown to Zero Day?
This is an utterly engrossing true life tale of the coders who unraveled the where when's and how's of the Stuxnet virus. Part cyber detective story, part geopolitical thriller, Countdown to Zero Day deftly takes the listener through the efforts of a small group of private cybersecurity experts who stumbled upon the virus and through dogged effort began to unravel its components to discover its true purpose. Wisely, the author reveals this piecemeal, mirroring the experiences of the cyber sleuths as they slowly crack the multidimensional virus. There are no big or juicy revelations here - anyone who has followed Iran's efforts to acquire nuclear weapons technology will have heard about Stuxnet and the alleged role the US and Israel played in it. Rather, Countdown intrigues in an All the President's Men sort of way - how intrepid doggedness on the part of ordinary people (substitute coders for reporter) can uncover the darkest and most hidden reaches of power.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
6 people found this helpful
-
Overall
-
Performance
-
Story
- Ray
- 06-11-21
Well researched
The amount of research put into this book is incredible. This was very, very good. Also, I almost didn’t get this because of reviewers complaining about the narrator. I’m glad I went for it. I think that the complaints are unfounded. The performance was on point.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- profile
- 11-27-14
Extremely bias writing.
What would have made Countdown to Zero Day better?
A more balanced point of view.
What was most disappointing about Kim Zetter’s story?
Blames America and its allies for all the problems created by the introduction of this virus.
What aspect of Joe Ochman’s performance would you have changed?
none
Any additional comments?
A waste of time. Very disappointing story. Extremely one sided.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Encino Man
- 06-02-15
Well Researched but "Preachy"
The first 75% of the book is well-researched and enjoyable. Unfortunately, the last 25% preaches the unlikely belief that if the makers of Stuxnet (US & Israel) opened the door for countries such as North Korea, Iran and others to do their own cyber warfare. Is he kidding? North Korea is involved with everything from counterfeiting U.S. currency to kidnapping, not to mention nuclear extortion. Stuxnet may or may not have been a good idea, but to think that nation states such as North Korea somehow now feel okay with their own cyber programs because of Stuxnet is just more rehashing of the age old (and I believe discredited) argument that it is the U.S. militarism that has caused other nations to do the bad things that they do and that if we were nicer then everyone else would be as well. I'm not sure that the beheaders of ISIL would agree but wouldn't it be be great if the world was devoid of bad people -- sadly it's not.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Brad
- 02-18-15
A New Form of Terrorism Is Born
What did you love best about Countdown to Zero Day?
The literal genius that went into creating the first digital weapon as well as the literal genius it took to find it and figure out what is was. I really appreciated how this book read like a fictional spy novel at times. I had to keep reminding myself that this is non-fiction. If you are wondering how resourceful our government is when it comes to stopping global terrorism listen to this book.
Who was your favorite character and why?
The entire team at Norton Anti Virus. To me they are both heroes and truly the brilliant minds of our time. The way they stuck with finding the answers to exactly what was behind the Stuxnet Virus was impressive. They could have stopped at any time but they had to solve this puzzle for themselves as much as the computer community. Their dedication went so far as to learn a new computer programing language that they would never use in the real world, just to learn more about the Stuxnet Virus.
Have you listened to any of Joe Ochman’s other performances before? How does this one compare?
I have not but I would again. It was a very good performance.
If you were to make a film of this book, what would the tag line be?
Blessed are the GEEKS as they will dominate the earth.
Any additional comments?
I did not give the book five stars as some parts of the book are very technical. I am in the IT industry and it was a bit much for me. It did not take away from the story as a whole but it did slow the story down in a few spots. I understand it was important to have the information in there to help us understand the scope and power of Stuxnet but it was not my favorite part of the book.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- PT
- 02-13-15
A Good Adventure Story--and Peek at the Future
This is a book that makes a complex subject understandable and enjoyable.
I bought my first PC in 1984. I am a self-taught user with a degree in journalism. As a technical writer I have written many software manuals, but nothing as complex as this. So I admire Kim Zetter's achievement here. I think anyone would appreciate how well the subject is explained.
There's also a lot here about implications for the future, along with appraisals of the SOTA. And all of that is very chilling.
I think the US may be woefully unprepared for cyberdefense and when the lights go out, it will be scary indeed. I hope some people with the power to prevent that will read this book. The difference between 9/11 and cyberwar is that we KNOW there will be a cyber war someday. This book shows our part in getting it started. (A necessary evil, IMO.)
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Umoumlex
- 02-06-15
I loved
I love the fact that it's a very detailed counter of what's happening in cyberspace.it's worth didn't my time I would read it again it's like imagining a movie.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story

- Just little old me
- 04-01-15
Fascinating subject and an amazing story
Well researched, probably bit too much detail for me, but a wake up call if ever there was one. Makes me want to run to the hills .. It's so hard to build 'safe' connected systems. Started listening to security now on twit.tv to try to keep up with the latest what is going on. Any IT person should read/listen to this book and think very hard about what they are doing and how to protect themselves.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
4 people found this helpful
-
Overall
-
Performance
-
Story

- Nick
- 04-18-15
Intriguing story - well told!
An interesting contemporary subject well researched and told. Great level of detail that doesn't distract the listener from the main context of the story. I enjoyed it very much
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful
-
Overall
-
Performance
-
Story

- R D Droy
- 12-31-14
Scary but informative
This book was brilliant. It reads like a thriller but is the true story of the first cyber warfare attack on Iran. Detailed and meticulous research is coupled with a real understanding of the wider political context of the age. There are some highly technical chapters but I got used to the jargon fairly quickly and didn't worry too much if I didn't understand every aspect of the computing systems.
Narrated in a factual way, clear and at a reasonable pace..
Learnt a great deal by reading this book and will take more notice of virus attacks in the future.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story

- Amazon Customer
- 07-17-22
Narrator sounds like Microsoft Text to Speech
The story is good and well detailed, but as other reviews say, a bit too detailed. I am IT trained and have study and work in the field but the way it’s written/read i just found it hard to get hooked. Seemed very slow and drawn out. The story of which it’s about it fascinating though and worth some research into, although unfortunately i don’t think the book does it justice and just couldn’t stay focused.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story

- John
- 05-26-21
Great read!
Have you ever came across a news article and thought, "how on earth did that not start a war?! How was this not headline news all over the whole globe?". This is exactly that. The implications of this type of warfare are truly terrifying.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story

- Peekay
- 04-19-21
USA vs Iran
great for learning about cyber state warfare, this give insight to how things begin
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story

- Pest of Buda
- 01-02-21
The only 'known' cyberattack, as of writing
I liked how it started, how it described the computational thinking behind the worn. You actually don't even need be tech minded to grasp this. So for me the book has three main focuses: the worm, the team that cracked it, international laws. The international laws part seemed to drag on a bit, but was still necessary to the story.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story

- Kris Als
- 12-17-20
brilliant, well researched and narrated book
Really well researched, thought through and insightful book about a watershed moment in cyber security and cyber warfare: "Stuxnet". highly recommend it to anyone interested in information security and the world order!
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story

- AS
- 11-18-20
Good book, but a bit too long
Provides a lot of info, but sometimes dives too much and I failed to see the relevance.
Otherwise, pretty interesting. Reader absolutely ok.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story

- Null
- 10-06-20
From a cyber security professional (me): This is the real deal
All listeners will enjoy this, and especially those listeners like myself which work on the technical side of cyber security. This book also fulfills my other main interests, the history and use of espionage, diplomacy and international law. I can recommend this even to the most educated listeners in either realm of knowledge as I can promise you that you will learn something about the other half of this amazing true story.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story

- Jason
- 05-20-17
A Thrilling Eye-Opener
Although we all know about computer viruses, few of us have much of an understanding of how much of a role cyber-warfare plays in international espionage and sabotage.
Countdown to Zero Day does a great job in enlightening us about all levels of cyber attack and defence, focussing on the extraordinary Stuxnet attack interwoven with countless other examples.
With a good balance between intrigue and technical detail, it held my attention the whole time. Well written and well read.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful
-
Overall
-
Performance
-
Story

- Anonymous User
- 09-11-20
Great detail - not too technical
Excellent technical analysis of Stuxnet as well as the enabling operations that ensured its success.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story

- Anonymous User
- 01-29-19
Brilliant recap of the political and tech aspects
Brilliant recap of the political and the technological aspects of stuxnet and the teams behind it
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
People who viewed this also viewed...
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- By: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrated by: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Length: 12 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- By Silvershopper on 01-18-23
By: Laurent Richard, and others
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall