Wednesday, 05 September 2018 09:47

Book review: Cyber Wars by Charles Arthur


This is an interesting in-depth look at some of the more (in)famous hacks and intrusions in recent history.

Cyber Wars takes a close look at seven major incidents that have reached a high-level of public awareness, covering:

  • The TJX WEP intrusion in 2006
  • HB Garry in 2011
  • The Sony event in 2014
  • TalkTalk in 2014
  • John Podesta’s email in 2016
  • Ransomware particularly since 2016
  • Mirai Botnet in 2016

Charles Arthur devotes about 30 pages to each incident, giving some history and background along with a broad look at how the attack was perpetrated and the overall impact.

For instance, the book steps back to 1989 to identify the first ransomware attack, conducted by Joseph Popp, seemingly a very odd individual who took to wearing a cardboard box on his head in court – where he was judged unfit for trial.

Similarly, we have plenty of substance and background for all of the events included, which is what we should expect for a book coming from someone with a long history of freelance technology reporting.

As well as taking major incidents that were widely reported and were clearly in the consciousness of the general public, each chapter is intended as an example of various types of incident, ranging from direct "hacking" (the Podesta event), through typical ransomware to illicit data usage via outsourcing (the TalkTalk chapter). At the end of each chapter is a number of "lessons" - these are probably the most important part of the book.

Every chapter is well-researched and compellingly told. However, it seems the book lacks a clear understanding of who the intended reader might be. As someone with plenty of history and knowledge of the industry, this writer was pleased to be reminded of many incidents that had somewhat faded from memory, but it seemed the book was targeted more at the lay reader who sought the upmarket sensationalism and story-telling that is so amply delivered. But that reader would be unlikely to pick up the book in a bookstore.

Perhaps the best use might be as a reference guide to business leaders who require a broad review of hacking and intrusion to improve their understanding of business security. If you know someone like this, buy this book and give it to them for Christmas!

The book is available now from Amazon Australia for $25.33 or from the US site for US$13.36.


26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more


David Heath

David Heath has had a long and varied career in the IT industry having worked as a Pre-sales Network Engineer (remember Novell NetWare?), General Manager of IT&T for the TV Shopping Network, as a Technical manager in the Biometrics industry, and as a Technical Trainer and Instructional Designer in the industrial control sector. In all aspects, security has been a driving focus. Throughout his career, David has sought to inform and educate people and has done that through his writings and in more formal educational environments.



Recent Comments