Newest Scientific American E-Book Ripped from the Headlines: Cyber Hacking: Wars in Virtual Space

Join Our Community of Science Lovers!

This article was published in Scientific American’s former blog network and reflects the views of the author, not necessarily those of Scientific American



On supporting science journalism

If you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.



From media and communications to banking, an increasing number of our daily activities is performed online. While this transformation has raised the curtain on exciting new frontiers, it also opens doors to security threats undreamed of by previous generations. In Scientific American's newest eBook, Cyber Hacking: Wars in Virtual Space, we peer behind the scenes of cyberspace. First, we look at the brains of those behind these crimes and misdemeanors--Section 1, "The Hacker," discusses who they are, how they work, their motivations and methods. The opening article examines hardware--specifically microprocessors and why they are vulnerable to tampering. Then we turn to the internal attacks, worms and viruses, the damage from which ranges from merely inconvenient to expensive and dangerous. Into the latter category falls the Stuxnet virus, which attacked Iran's nuclear facilities and is discussed in "Hacking the Lights Out." Section 2, "Nowhere To Hide," takes a broad look at issues of privacy and the technology used to gather and track personal information. The first article, "The End of Privacy?", analyzes how the social definition of privacy has changed, often along generational lines, in the cyber age. With so much personal information volunteered on social networking and other sites, how much privacy can people expect? Most of us leave a trail of data wherever we go, and subsequent articles in this section look at how that process unfolds. On a positive note, Section 3, "The Solutions," covers innovative technologies used to secure cyber networks and safeguard information. In particular, "Beyond Fingerprinting" discusses replacing identifiers such as user names and passwords with biometrics--behavioral or anatomical markers including but not limited to fingerprints. These approaches are becoming more widespread as inexpensive sensors and microprocessors become available, and thus the competition between the hackers and information security professionals races on. Click here to buy this and other Scientific American eBooks: http://books.scientificamerican.com/sa-ebooks/.

It’s Time to Stand Up for Science

If you enjoyed this article, I’d like to ask for your support. Scientific American has served as an advocate for science and industry for 180 years, and right now may be the most critical moment in that two-century history.

I’ve been a Scientific American subscriber since I was 12 years old, and it helped shape the way I look at the world. SciAm always educates and delights me, and inspires a sense of awe for our vast, beautiful universe. I hope it does that for you, too.

If you subscribe to Scientific American, you help ensure that our coverage is centered on meaningful research and discovery; that we have the resources to report on the decisions that threaten labs across the U.S.; and that we support both budding and working scientists at a time when the value of science itself too often goes unrecognized.

In return, you get essential news, captivating podcasts, brilliant infographics, can't-miss newsletters, must-watch videos, challenging games, and the science world's best writing and reporting. You can even gift someone a subscription.

There has never been a more important time for us to stand up and show why science matters. I hope you’ll support us in that mission.

Thank you,

David M. Ewalt, Editor in Chief, Scientific American

Subscribe