Fancy Bear Goes Phishing Audiobook By Scott J. Shapiro cover art

Fancy Bear Goes Phishing

The Dark History of the Information Age, in Five Extraordinary Hacks

Preview

Try for $0.00
Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.

Fancy Bear Goes Phishing

By: Scott J. Shapiro
Narrated by: Jonathan Todd Ross
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $24.74

Buy for $24.74

Confirm purchase
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.
Cancel

About this listen

Long-listed, Amazon.com Best Books of the Year, 2023

"Unsettling, absolutely riveting, and—for better or worse—necessary reading."—Brian Christian, author of Algorithms to Live By and The Alignment Problem

An entertaining account of the philosophy and technology of hacking—and why we all need to understand it.

It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian “Dark Avenger,” who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton’s cell phone, the Russian intelligence officers who sought to take control of a US election, and others.

In telling their stories, Shapiro exposes the hackers’ tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of Gödel, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.

A Macmillan Audio production from Farrar, Straus and Giroux.

©2023 Scott J. Shapiro (P)2023 Macmillan Audio
History Science & Technology True Crime Hacking Computer Security Espionage Exciting Programming Software Military Internet Cyber warfare
activate_Holiday_promo_in_buybox_DT_T2

Critic reviews

"Ingenious coding, buggy software, and gullibility take the spotlight in this colorful retrospective of hacking . . . Shapiro’s snappy prose manages the extraordinary feat of describing hackers’ intricate coding tactics and the flaws they exploit in a way that is accessible and captivating even to readers who don’t know Python from JavaScript. The result is a fascinating look at the anarchic side of cyberspace."Publishers Weekly

“This is an engrossing read . . . An authoritative, disturbing examination of hacking, cybercrime and techno-espionage.”Kirkus Reviews

"The question of trust is increasingly central to computing, and in turn to our world at large. Fancy Bear Goes Phishing offers a whirlwind history of cybersecurity and its many open problems that makes for unsettling, absolutely riveting, and—for better or worse—necessary reading."—Brian Christian, author of Algorithms to Live By and The Alignment Problem

What listeners say about Fancy Bear Goes Phishing

Average customer ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    60
  • 4 Stars
    23
  • 3 Stars
    7
  • 2 Stars
    6
  • 1 Stars
    2
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    60
  • 4 Stars
    23
  • 3 Stars
    4
  • 2 Stars
    1
  • 1 Stars
    0
Story
  • 4.5 out of 5 stars
  • 5 Stars
    56
  • 4 Stars
    17
  • 3 Stars
    6
  • 2 Stars
    5
  • 1 Stars
    4

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

Good pacing, but a little all over

Overall good. But when he said "Apartment 28" instead of APT 28, my inner cyber analyst cringed. I enjoyed the content and could make a drinking game out of the number of times he says "up-code" or "down-code".

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    2 out of 5 stars

A Decent Read / Listen

Writing can be cringy and narrator has problems with some pronunciations but otherwise a decent read.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    5 out of 5 stars

Familiar stories with new twists

Although I've heard some of these stories a hundred times, I still learned new things. The angle he took to describe everything is very accessible and I encourage anyone from beginner to advanced to check out this book. The narrator's voice was great and he only fumbled a couple times over some of the IT terms. I visited the author's social media and was not disappointed. I'd definitely take any course he decided to teach.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great combination of history and current events

Really enjoyed the in depth stories about the origins of our operating systems, early hackers, and the premise and motives behind hacking events. I appreciate the author’s research and ability to share their personal knowledge and experience in a way that makes the book compelling to the reader.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars

Exceptional exploration of modern day hams and their perpetrators

It is rare to find a book written by a university law professor that is both engaging and informative. This one is exceptionally clear and deals with the number of complex issues, as well as their real world reflections in popular society. It is definitely recommended reading for anyone interested in cyber security and modern day technological evolution on social media. The discussion of the difference between upcode and down code is also very elucidating. The clear distinction made between hacking and cyber warfare is also very helpful to an understanding of of why interference in a state’s politics is not an act of war. Enjoy!

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

interesting

Myself not having a background in cyber security, found the information and explanations easily processed.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    2 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    2 out of 5 stars

Long

The story is too long and wandering. It could be more concise. I’m sure it’s very informative for some.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    2 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    2 out of 5 stars

Not a very complete sotry

impossibly high level overview of cybersecurity with brief discussion of recent events and hacks.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    1 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    1 out of 5 stars

Self-aggrandizing author

Did I lean something? Definitely. Many interesting tidbits and a solid narrator. I was super interested to read another viewpoint on some of the early hacking communities and malware as I’ve read a few books in this area.

However, the author attempts to educate the audience in a variety of ways that are self-aggrandizing of his expertise in an area where he clearly is not. I understand the need to break down complexities for an audience but wow this was painful at times. This includes a seemingly simple description of Middle Eastern geopolitical conflicts as something he has the authority to speak on as well as make matter of fact statements on how entire countries will react to situations.

I found the opening background of his education and how he came back to this topic over the top, but there are so many worse examples throughout the book. Do yourself a favor and learn about malware from someone in the field that wants to tell you about their field. Not someone that passes opinion along as smoothly as fact.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    2 out of 5 stars
  • Performance
    3 out of 5 stars
  • Story
    1 out of 5 stars

keep your personal opinion out

was an okay book until the author stared spewing stupid crap about the origin of the constitution and that states should have senators based on their population. also Larry Ellison is not a founder of an OS company.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!