Close cookie details

This site uses cookies. Learn more about cookies.

OverDrive would like to use cookies to store information on your computer to improve your user experience at our Website. One of the cookies we use is critical for certain aspects of the site to operate and has already been set. You may delete and block all cookies from this site, but this could affect certain features or services of the site. To find out more about the cookies we use and how to delete them, click here to see our Privacy Policy.

If you do not wish to continue, please click here to exit this site.

Hide notification

  Main Nav
Countdown to Zero Day
Cover of Countdown to Zero Day
Countdown to Zero Day
Stuxnet and the Launch of the World's First Digital Weapon
Borrow Borrow
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. 

“Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post
 
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
 
In these pages, journalist Kim Zetter tells the whole story behind the world’s first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making.
 
But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. 

“Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post
 
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
 
In these pages, journalist Kim Zetter tells the whole story behind the world’s first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making.
 
But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.
Available formats-
  • OverDrive Listen
  • OverDrive MP3 Audiobook
Languages:-
Copies-
  • Available:
    1
  • Library copies:
    1
Levels-
  • ATOS:
  • Lexile:
  • Interest Level:
  • Text Difficulty:


Excerpts-
  • From the book

    CHAPTER 1

    EARLY WARNING

    Sergey Ulasen is not the sort of person you’d expect to find at the center of an international incident. The thirty-one-year-old Belarusian has close-cropped blond hair, a lean boyish frame, and the open face and affable demeanor of someone who goes through life attracting few enemies and even fewer controversies. One of his favorite pastimes is spending the weekend at his grandmother’s country house outside Minsk, where he decompresses from weekday stresses, far from the reach of cell phones and the internet. But in June 2010, Ulasen encountered something unusual that soon propelled him into the international spotlight and into a world of new stress.1

    It was a warm Thursday afternoon, and Ulasen, who headed the antivirus division of a small computer security firm in Belarus called Virus–BlokAda, was seated with his colleague Oleg Kupreev in their lab in downtown Minsk inside a drab, Soviet-era building about a block from the Svisloch River. They were sifting methodically through suspicious computer files they had recently found on a machine in Iran when something striking leapt out at Kupreev. He sat back in his chair and called Ulasen over to take a look. Ulasen scrolled through the code once, then again, to make sure he was seeing what he thought he saw. A tiny gasp escaped his throat. The code they had been inspecting the past few days, something they had until now considered a mildly interesting but nonetheless run-of-the-mill virus, had just revealed itself to be a work of quiet and diabolical genius.

    Not only was it using a skillful rootkit to cloak itself and make it invisible to antivirus engines, it was using a shrewd zero-day exploit to propagate from machine to machine—an exploit that attacked a function so fundamental to the Windows operating system, it put millions of computers at risk of infection.

    Exploits are attack code that hackers use to install viruses and other malicious tools onto machines. They take advantage of security vulnerabilities in browser software like Internet Explorer or applications like Adobe PDF Reader to slip a virus or Trojan horse onto a system, like a burglar using a crowbar to pry open a window and break into a house. If a victim visits a malicious website where the exploit lurks or clicks on a malicious e‑mail attachment containing an exploit, the exploit uses the security hole in the software to drop a malicious file onto their system. When software makers learn about such holes in their products, they generally produce “patches” to close them up and seal the intruders out, while antivirus firms like Ulasen’s add signatures to their scanners to detect any exploits that try to attack the vulnerabilities.

    Zero-day exploits, however, aren’t ordinary exploits but are the hacking world’s most prized possession because they attack holes that are still unknown to the software maker and to the antivirus vendors—which means there are no antivirus signatures yet to detect the exploits and no patches available to fix the holes they attack.

    But zero-day exploits are rarely found in the wild. It takes time and skill for hackers to discover new holes and write workable exploits to attack them, so the vast majority of hackers simply rely on old vulnerabilities and exploits to spread their malware, counting on the fact that most computer users don’t often patch their machines or have up-to-date antivirus software installed, and that it can take vendors weeks or months to produce a patch for a known hole. Although more than 12 million viruses and other malicious files are captured each year, only about a dozen or so...
About the Author-
  • KIM ZETTER is an award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired. She was among the first journalists to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. She has also broken numerous stories over the years about WikiLeaks and Bradley Manning, NSA surveillance, and the hacker underground.
Reviews-
  • Publisher's Weekly

    Starred review from September 8, 2014
    Cyberwarfare catapulted from science fiction into reality in 2010, when a previously unknown military-grade computer virus attacked centrifuges in Iran that were allegedly being used to enrich uranium for nuclear bombs. Zetter (Simple Kabbalah), a senior writer for Wired magazine, details how a series of clues led a small but intrepid group of computer security specialists from around the world to discover Stuxnet, the world’s first “zero-day exploit,” a virus without a patch. The origins of the virus were eventually traced to the U.S. and Israel, and though the allies frustrated Iran’s efforts to acquire a nuclear weapon, unleashing the virus was “remarkably reckless,” Zetter argues. Stuxnet and its successors have compromised trusted components of the international computer world, like digital certificates and security updates, and have drawn unwelcome attention to vulnerable U.S. energy, water, and transportation infrastructures. Zetter suggests that the Stuxnet attack has opened up a digital Pandora’s box, “legitimizing” a new strain of warfare against which there is little defense and inciting an arms race carried on behind the scenes. Even readers who can’t tell a PLC from iPad will learn much from Zetter’s accessible, expertly crafted account, which unpacks this complex issue with the panache of a spy thriller. Agent: David Fugate, LaunchBooks Literary Agency.

  • Washington Post "Immensely enjoyable...Zetter turns a complicated and technical cyber- story into an engrossing whodunit...The age of digital warfare may well have begun."
  • Economist "An authoritative account of Stuxnet's spread and discovery...[delivers] a sobering message about the vulnerability of the systems--train lines, water-treatment plants, electricity grids--that make modern life possible."
  • Wall Street Journal "Exhaustively researched...Zetter gives a full account of this "hack of the century," as the operation has been called, [but] the book goes well beyond its ostensible subject to offer a hair-raising introduction to the age of cyber warfare."
  • Kevin Mitnick, New York Times bestselling author of Ghost in the Wires and The Art of Intrusion "Part detective story, part scary-brilliant treatise on the future of warfare...an ambitious, comprehensive, and engrossing book that should be required reading for anyone who cares about the threats that America--and the world--are sure to be facing over the coming years."
  • Publishers Weekly (starred) "Unpacks this complex issue with the panache of a spy thriller...even readers who can't tell a PLC from an iPad will learn much from Zetter's accessible, expertly crafted account."
  • Kirkus "A true techno-whodunit [that] offers a sharp account of past mischief and a glimpse of things to come...Zetter writes lucidly about mind-numbingly technical matters, reveling in the geekery of malware and espionage, and she takes the narrative down some dark electronic corridors... Governments, hackers and parties unknown are launching ticking computer time bombs every day, all coming to a laptop near you."
  • Bruce Schneier, author of Secrets and Lies and Schneier on Security "An exciting and readable story of the world's first cyberweapon. Zetter not only explains the weapon and chronicles its discovery, but explains the motives and mechanics behind the attack -- and makes a powerful argument why this story matters."
Title Information+
  • Publisher
    Books on Tape
  • OverDrive Listen
    Release date:
  • OverDrive MP3 Audiobook
    Release date:
Digital Rights Information+
  • OverDrive MP3 Audiobook
    Burn to CD: 
    Permitted
    Transfer to device: 
    Permitted
    Transfer to Apple® device: 
    Permitted
    Public performance: 
    Not permitted
    File-sharing: 
    Not permitted
    Peer-to-peer usage: 
    Not permitted
    All copies of this title, including those transferred to portable devices and other media, must be deleted/destroyed at the end of the lending period.

Status bar:

You've reached your checkout limit.

Visit your Checkouts page to manage your titles.

Close

You already have this title checked out.

Want to go to your Checkouts?

Close

Recommendation Limit Reached.

You've reached the maximum number of titles you can recommend at this time. You can recommend up to 99 titles every 1 day(s).

Close

Sign in to recommend this title.

Recommend your library consider adding this title to the Digital Collection.

Close

Enhanced Details

Close
Close

Limited availability

Availability can change throughout the month based on the library's budget.

is available for days.

Once playback starts, you have hours to view the title.

Close

Permissions

Close

The OverDrive Read format of this eBook has professional narration that plays while you read in your browser. Learn more here.

Close

Holds

Total holds:


Close

Restricted

Some format options have been disabled. You may see additional download options outside of this network.

Close

MP3 audiobooks are only supported on macOS 10.6 (Snow Leopard) through 10.14 (Mojave). Learn more about MP3 audiobook support on Macs.

Close

Please update to the latest version of the OverDrive app to stream videos.

Close

Device Compatibility Notice

The OverDrive app is required for this format on your current device.

Close

Bahrain, Egypt, Hong Kong, Iraq, Israel, Jordan, Kuwait, Lebanon, Libya, Mauritania, Morocco, Oman, Palestine, Qatar, Saudi Arabia, the Sudan, the Syrian Arab Republic, Tunisia, Turkey, the United Arab Emirates, and Yemen

Close

You've reached your library's checkout limit for digital titles.

To make room for more checkouts, you may be able to return titles from your Checkouts page.

Close

Excessive Checkout Limit Reached.

There have been too many titles checked out and returned by your account within a short period of time.

Try again in several days. If you are still not able to check out titles after 7 days, please contact Support.

Close

You have already checked out this title. To access it, return to your Checkouts page.

Close

This title is not available for your card type. If you think this is an error contact support.

Close

An unexpected error has occurred.

If this problem persists, please contact support.

Close

Close

NOTE: Barnes and Noble® may change this list of devices at any time.

Close
Buy it now
and help our library WIN!
Countdown to Zero Day
Countdown to Zero Day
Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter
Choose a retail partner below to buy this title for yourself.
A portion of this purchase goes to support your library.
Close
Close

There are no copies of this issue left to borrow. Please try to borrow this title again when a new issue is released.

Close
Barnes & Noble Sign In |   Sign In

You will be prompted to sign into your library account on the next page.

If this is your first time selecting “Send to NOOK,” you will then be taken to a Barnes & Noble page to sign into (or create) your NOOK account. You should only have to sign into your NOOK account once to link it to your library account. After this one-time step, periodicals will be automatically sent to your NOOK account when you select "Send to NOOK."

The first time you select “Send to NOOK,” you will be taken to a Barnes & Noble page to sign into (or create) your NOOK account. You should only have to sign into your NOOK account once to link it to your library account. After this one-time step, periodicals will be automatically sent to your NOOK account when you select "Send to NOOK."

You can read periodicals on any NOOK tablet or in the free NOOK reading app for iOS, Android or Windows 8.

Accept to ContinueCancel