The Cyber Threat

Actionable Intelligence For Your Enterprise

The Cuckoo’s Egg: Exciting first person account of the opening event of the age of cyber conflict

The Cuckoo’s Egg contains foundational knowledge everyone in the cyber security world should know.

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker’s code name was “Hunter” — a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases — a one-man sting operation that finally gained the attention of the CIA…and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

For more see: The Cuckoo’s Egg

Also see our list of Threat Feeds, References, Cyber Intelligence Blogs, Government Cyber Intelligence Sources and Top Cyber Threat Reports. Also see Other Web References.

For deeper background on the changing environment the threat (and you) operate in, dive deep into Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things and Cybersecurity. Track those and more in the Things Cyber Tech Landscape.

 

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • More
  • Pocket
  • Pinterest
  • Reddit
  • Tumblr
  • Print

Filed Under: Reading

Threat References Threat Feeds Twitter News Feed Get The Book Other Great Cyber Threat Books Top Cyber Sites

Copyright © 2024 · Parallax Pro Theme on Genesis Framework · WordPress · Log in