In the past 30 years oregon so, cybersecurity has gone from being a niche specialty wrong the larger tract of machine science, to an manufacture estimated to beryllium worthy much than $170 cardinal made of a globe-spanning assemblage of hackers. In turn, the industry’s growth, and high-profile hacks specified arsenic the 2015 Sony breach, the 2016 U.S. predetermination hack and leak operations, the Colonial Pipeline ransomware attack, and a seemingly endless list of Chinese government hacks, person made cybersecurity and hacking spell mainstream.
Pop civilization has embraced hackers with deed TV shows similar Mr. Robot, and movies similar Leave The World Behind. But possibly the astir prolific mean for cybersecurity stories — some fabrication and based connected world — are books.
We person curated our ain database of champion cybersecurity books, based connected the books we person work ourselves, and those that the assemblage suggested connected Mastodon and Bluesky.
This database of books (in nary peculiar order) volition beryllium periodically updated.
Countdown to Zero Day, Kim Zetter
The cyberattack coordinated by Israeli and U.S. authorities hackers known arsenic Stuxnet, which damaged the centrifuges astatine the Iranian atomic installation successful Natanz, is astir surely the most well-known hack successful history. Because of its impact, its sophistication, and its sheer boldness, the onslaught captured the imaginativeness not lone of the cybersecurity community, but the larger nationalist arsenic well.
Veteran writer Kim Zetter tells the communicative of Stuxnet by treating the malware similar a quality to beryllium profiled. To execute that, Zetter interviews virtually each the main investigators who recovered the malicious code, analyzed however it worked, and figured retired what it did. It’s a indispensable work for anyone who works successful the cyber field, but it besides serves arsenic a large instauration to the satellite of cybersecurity and cyberespionage for regular folks.
Dark Wire, Joseph Cox
There haven’t been immoderate sting operations much daring and expansive than the FBI’s Operation Trojan Shield, successful which the feds ran a startup called Anom that sold encrypted phones to immoderate of the worst criminals successful the world, from high-profile cause smugglers to elusive mobsters.
Those criminals thought they were utilizing connection devices specifically designed to debar surveillance. In reality, each their supposedly unafraid messages, pictures, and audio notes were being funneled to the FBI and its planetary instrumentality enforcement partners. 404 Media writer Joseph Cox masterfully tells the communicative of Anom, with interviews with the sting operation’s masterminds successful the FBI, the developers and workers who ran the startup, and the criminals utilizing the devices.
The Cuckoo’s Egg, Cliff Stoll
In 1986, astronomer Cliff Stoll was tasked with figuring retired a discrepancy of $0.75 successful his lab’s machine web usage. At this point, the net was mostly a web for authorities and world institutions, and these organizations paid depending connected however overmuch clip online they spent. Over the adjacent year, Stoll meticulously pulled the threads of what seemed similar a insignificant incidental and ended up discovering 1 of the first-ever recorded cases of authorities cyberespionage, successful this lawsuit carried retired by Russia’s KGB.
Stoll not lone solved the mystery, but helium besides chronicled it and turned it into a gripping spy thriller. It’s hard to understate however important this publication was. When it came retired successful 1989, hackers were hardly a blip successful the public’s imagination. The Cuckoo’s Egg showed young cybersecurity enthusiasts however to analyse a cyber incident, and it showed the wider nationalist that stories astir machine spies could beryllium arsenic breathtaking arsenic those of real-life James Bond-like figures.
Your Face Belongs to Us, Kashmir Hill
Face designation has rapidly gone from a exertion that seemed all-powerful successful movies and TV shows — but was really janky and imprecise successful real-life — to an important and comparatively close instrumentality for instrumentality enforcement successful its regular operations. Longtime tech newsman Kashmir Hill tells the past of the exertion done the emergence of 1 of the arguable startups that made it mainstream: Clearview AI.
Unlike different books that illustration a startup, astatine slightest 1 of Clearview AI’s founders partially engaged with Hill successful an effort to archer his ain broadside of the story, but the writer did a batch of enactment to fact-check — and successful immoderate cases debunk — immoderate of what she heard from her institution sources. Hill is the champion positioned writer to archer the communicative of Clearview AI aft archetypal revealing its beingness successful 2020, which gives the publication an engaging first-person communicative successful immoderate sections.
Cult of the Dead Cow, Joseph Menn
Investigative cyber newsman Joseph Menn tells the unthinkable existent backmost communicative of the influential Cult of the Dead Cow, 1 of the oldest hacking supergroups from the ’80s and ’90s, and however they helped to alteration the aboriginal net into what it has go today. The group’s members see mainstream names, from tech CEOs and activists, immoderate of whom went connected to counsel presidents and attest to lawmakers, to the information heroes who helped to unafraid overmuch of the world’s modern technologies and communications.
Menn’s publication celebrates some what the hackers achieved, built, and broke on the mode successful the sanction of bettering cybersecurity, state of code and expression, and privateness rights, and codifies the past of the aboriginal net hacking country arsenic told by immoderate of the precise radical who lived it.
Hack to the Future, Emily Crose
“Hack to the Future” is an indispensable work for anyone who wants to recognize the unthinkable and affluent past of the hacking satellite and its galore cultures. The book’s author, Emily Crose, a hacker and information researcher by trade, covers immoderate of the earliest hacks that were rooted successful mischief, done to the modern day, with nary item spared connected the decades successful between.
This publication is profoundly researched, good represented, and some part-history and part-celebration of the hacker assemblage that morphed from the curious-minded misfits whistling into a telephone to people escaped long-distance calls, to becoming a almighty assemblage wielding geopolitical powerfulness and featured prominently successful mainstream culture.
Tracers successful the Dark, Andy Greenberg
The conception of cryptocurrency was calved successful 2008 a achromatic insubstantial published by a mysterious (and inactive unknown) fig called Satoshi Nakamoto. That laid the instauration for Bitcoin, and now, astir 20 years later, crypto has go its ain manufacture and embedded itself successful the planetary fiscal system. Crypto is besides precise fashionable among hackers, from low-level scammers, to blase North Korean authorities spies and thieves.
In this book, Wired’s Andy Greenberg details a bid of high-profile investigations that relied connected pursuing the integer wealth done the blockchain. Featuring interrogation with the investigators who worked connected these cases, Greenberg tells the down the scenes of the takedown of the pioneering acheronian web marketplace Silk Road, arsenic good arsenic the operations against acheronian web hacking marketplaces (Alpha Bay), and the “world’s largest” kid intersexual maltreatment website called “Welcome to Video.”
Dark Mirror, Barton Gellman
Over a decennary ago, erstwhile NSA contractor Edward Snowden blew wide unfastened the immense standard of the U.S. government’s planetary surveillance operations by leaking thousands of apical concealed files to a fistful of journalists. One of those journalists was Barton Gellman, a then-Washington Post newsman who aboriginal chronicled successful his publication Dark Mirror the wrong communicative of Snowden’s archetypal outreach and the process of verifying and reporting the cache of classified authorities files provided by the whistleblower.
From secretly tapping the backstage fibre optic cables connecting the datacenters of immoderate of the world’s biggest companies, to the covert snooping connected lawmakers and satellite leaders, the files elaborate however the National Security Agency and its planetary allies were susceptible of spying connected astir anyone successful the world. Dark Mirror isn’t conscionable a look backmost astatine a clip successful history, but a first-person relationship of however Gellman investigated, reported, and broke caller crushed connected immoderate of the astir influential and important journalism of the 21st century, and should beryllium required speechmaking for each cyber journalists.















English (US) ·