Hacked Again
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
John Pruden
-
By:
-
Scott N. Schober
About this listen
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
As a small business owner, family man, and tech pundit, Scott finds himself leading a compromised life. By day, he runs a successful security company and reports on the latest cyber breaches in the hopes of offering solace and security tips to millions of viewers.
But, when a mysterious hacker begins to steal thousands from his bank account, go through his trash, and take over his social media identity, Scott stands to lose everything he has worked so hard for.
Amidst the backdrop of major breaches, Scott shares tips and best practices for all consumers. Most importantly, he shares his own story of being hacked repeatedly and how he has come to realize that the only thing as important as his own cybersecurity is that of his readers and viewers.
©2016 Scott Schober (P)2016 Scott SchoberListeners also enjoyed...
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- By: Scott N. Schober, Craig W. Schober
- Narrated by: Stephen Bowlby
- Length: 7 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now, joined by his brother Craig, the two have set their sights on the biggest target of all: small businesses. Throughout Cybersecurity Is Everybody's Business, Scott and Craig contextualize the impact of these cyber attacks on your small business and daily lives to provide expert insight and a plan of attack for fending off future security breaches.
By: Scott N. Schober, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Tipping Point
- How Little Things Can Make a Big Difference
- By: Malcolm Gladwell
- Narrated by: Malcolm Gladwell
- Length: 8 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
The tipping point is that magic moment when an idea, trend, or social behavior crosses a threshold, tips, and spreads like wildfire. Just as a single sick person can start an epidemic of the flu, so too can a small but precisely targeted push cause a fashion trend, the popularity of a new product, or a drop in the crime rate. This widely acclaimed bestseller, in which Malcolm Gladwell explores and brilliantly illuminates the tipping point phenomenon, is already changing the way people throughout the world think about selling products and disseminating ideas.
-
-
My tipping point…for audio
- By Mod on 04-17-12
By: Malcolm Gladwell
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- By: Scott N. Schober, Craig W. Schober
- Narrated by: Stephen Bowlby
- Length: 7 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now, joined by his brother Craig, the two have set their sights on the biggest target of all: small businesses. Throughout Cybersecurity Is Everybody's Business, Scott and Craig contextualize the impact of these cyber attacks on your small business and daily lives to provide expert insight and a plan of attack for fending off future security breaches.
By: Scott N. Schober, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Tipping Point
- How Little Things Can Make a Big Difference
- By: Malcolm Gladwell
- Narrated by: Malcolm Gladwell
- Length: 8 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
The tipping point is that magic moment when an idea, trend, or social behavior crosses a threshold, tips, and spreads like wildfire. Just as a single sick person can start an epidemic of the flu, so too can a small but precisely targeted push cause a fashion trend, the popularity of a new product, or a drop in the crime rate. This widely acclaimed bestseller, in which Malcolm Gladwell explores and brilliantly illuminates the tipping point phenomenon, is already changing the way people throughout the world think about selling products and disseminating ideas.
-
-
My tipping point…for audio
- By Mod on 04-17-12
By: Malcolm Gladwell
-
The Like Switch
- An Ex-FBI Agent's Guide to Influencing, Attracting, and Winning People Over
- By: Jack Schafer PhD, Ph.D. Marvin Karlins Ph.D.
- Narrated by: George Newbern
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Like Switch is packed with all the tools you need for turning strangers into friends, whether you are on a sales call, a first date, or a job interview. As a Special Agent for the FBI's National Security Division's Behavioral Analysis Program, Dr. Jack Schafer developed dynamic and breakthrough strategies for profiling terrorists and detecting deception. Now, Dr. Schafer has evolved his proven-on-the-battlefield tactics for the day-to-day, but no less critical battle of getting people to like you.
-
-
Very informative , PDF on audible website....
- By Michael Jones on 11-30-15
By: Jack Schafer PhD, and others
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
In the Plex
- How Google Thinks, Works, and Shapes Our Lives
- By: Steven Levy
- Narrated by: L. J. Ganser
- Length: 19 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Few companies in history have ever been as successful and as admired as Google, the company that has transformed the Internet and become an indispensable part of our lives. How has Google done it? Veteran technology reporter Steven Levy was granted unprecedented access to the company, and in this revelatory book he takes listeners inside Google headquarters - the Googleplex - to explain how Google works.
-
-
Just ok for me
- By Everyday Mom on 04-23-11
By: Steven Levy
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- By: Brian Krebs
- Narrated by: Christopher Lane
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
-
-
Risky topic, but Br. Krebs hits it out of the park
- By RRiley on 12-21-14
By: Brian Krebs
-
Alibaba
- The House That Jack Ma Built
- By: Duncan Clark
- Narrated by: Jim Meskimen
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
In just a decade and a half, Jack Ma, a man from modest beginnings who started out as an English teacher, founded Alibaba and built it into one of the world's largest companies, an e-commerce empire on which hundreds of millions of Chinese consumers depend. Alibaba's $25 billion IPO in 2014 was the largest global IPO ever. A Rockefeller of his age who is courted by CEOs and presidents around the world, Jack is an icon for China's booming private sector.
-
-
Strange: Best part of story happens "off-screen"
- By Tristan on 09-02-16
By: Duncan Clark
-
How to Make People Like You in 90 Seconds or Less
- By: Nicholas Boothman
- Narrated by: Nicholas Boothman
- Length: 3 hrs and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
Whether meeting a new client or bumping into a potential mate, you only have a few seconds to make a favorable impression. Is that really possible? Author Nicholas Boothman, a lecturer and licensed master practitioner of neurolinguistic programming, believes yes! He introduces a revolutionary approach to face-to-face communication that will help anyone succeed at making meaningful, and immediate, connections.
-
-
Absolutely Wonderful
- By Maggie Baumann on 06-09-04
-
Street Smarts
- An All-Purpose Tool Kit for Entrepreneurs
- By: Norm Brodsky, Bo Burlingham
- Narrated by: Sean Pratt
- Length: 10 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
People starting out in business tend to seek step-by-step formulas or rules, but in reality there are no magic bullets. Rather, says veteran company-builder Norm Brodsky, there's a mentality that helps street- smart entrepreneurs solve problems and pursue opportunities as they arise. Brodsky shares his hard-earned wisdom every month in Inc. magazine, in the hugely popular "Street Smarts" column he cowrites with Bo Burlingham. Now they've adapted their best advice into a comprehensive guide for anyone running a small business.
-
-
This great audio was originally called The Knack!
- By morton on 12-16-11
By: Norm Brodsky, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
The Founder's Dilemmas
- By: Noam Wasserman
- Narrated by: Mark Mosely
- Length: 13 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Often downplayed in the excitement of starting up a new business venture is one of the most important decisions entrepreneurs will face: should they go it alone, or bring in cofounders, hires, and investors to help build the business? More than just financial rewards are at stake. Friendships and relationships can suffer. Bad decisions at the inception of a promising venture lay the foundations for its eventual ruin.
-
-
Too much talk on the data
- By Stanley Tan on 10-02-14
By: Noam Wasserman
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 9 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- By Jeremy on 06-12-15
By: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
We Are Anonymous
- Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
- By: Parmy Olson
- Narrated by: Abby Craden
- Length: 14 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
In late 2010, thousands of hacktivists joined a mass digital assault by Anonymous on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Splinter groups then infiltrated the networks of totalitarian governments in Libya and Tunisia, and an elite team of six people calling themselves LulzSec attacked the FBI, CIA, and Sony. They were flippant and taunting, grabbed headlines, and amassed more than a quarter of a million Twitter followers.
-
-
Interesting book, AWFUL narration
- By Jen on 11-11-14
By: Parmy Olson
Related to this topic
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Technically Wrong
- Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
- By: Sara Wachter-Boettcher
- Narrated by: Andrea Emmes
- Length: 5 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed, or why. It's time we change that. Many of the services we rely on are full of oversights, biases, and downright ethical nightmares. Chatbots that harass women. Signup forms that fail anyone who's not straight. Social media sites that send peppy messages about dead relatives. Algorithms that put more black people behind bars.
-
-
Pretty good but not complete
- By Casey on 10-29-17
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Technically Wrong
- Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
- By: Sara Wachter-Boettcher
- Narrated by: Andrea Emmes
- Length: 5 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed, or why. It's time we change that. Many of the services we rely on are full of oversights, biases, and downright ethical nightmares. Chatbots that harass women. Signup forms that fail anyone who's not straight. Social media sites that send peppy messages about dead relatives. Algorithms that put more black people behind bars.
-
-
Pretty good but not complete
- By Casey on 10-29-17
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Filter Bubble
- What the Internet Is Hiding from You
- By: Eli Pariser
- Narrated by: Kirby Heyborne
- Length: 7 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
In December 2009, Google began customizing its search results for each user. Instead of giving you the most broadly popular result, Google now tries to predict what you are most likely to click on. According to MoveOn.org board president Eli Pariser, Google's change in policy is symptomatic of the most significant shift to take place on the Web in recent years: the rise of personalization.
-
-
Now in the top 3 best books I've ever read
- By Brian Esserlieu on 05-26-11
By: Eli Pariser
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- By: Frank W. Abagnale
- Narrated by: Raymond Todd
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- By Sheila on 06-05-07
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Program or Be Programmed
- Ten Commands for a Digital Age
- By: Douglas Rushkoff
- Narrated by: Douglas Rushkoff
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 10 chapters, composed of 10 "commands", Rushkoff provides cyber enthusiasts and technophobes alike with the guidelines to navigate the digital new universe. In this spirited, accessible poetics of new media, Rushkoff picks up where Marshall McLuhan left off, helping listeners to recognize programming as the new literacy of the digital age - and as a template through which to see beyond social conventions and power structures that have vexed us for centuries.
-
-
Good book, but with some crazy ranting
- By Bjarne on 02-05-15
By: Douglas Rushkoff
-
Targeted
- How Technology Is Revolutionizing Advertising and the Way Companies Reach Consumers
- By: Mike Smith
- Narrated by: Michael Smith
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Far from the catchy television spots and sleek magazine spreads are the comparatively modest ads that pop up on websites and in Internet searches. But don't be fooled - online advertising is exploding. Growing at a compound annual rate near 20%, it is now the second-largest advertising channel in the United States. Part history, part guidebook, part prediction for the future, Targeted tells the story of the companies, individuals, and innovations driving this revolution.
-
-
Dense Language, Mediocre Narration
- By Fawn on 12-06-16
By: Mike Smith
-
High-Tech, High-Touch Customer Service
- Inspire Timeless Loyalty in the Demanding New World of Social Commerce
- By: Micah Solomon
- Narrated by: Micah Solomon, Sean Pratt
- Length: 6 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In an age of Twitter, smartphones, and self-service kiosks, high-tech but still high-touch customer service is the answer. Today’s customers are a hard bunch to crack. Time-strapped, screen-addicted, value-savvy, and socially engaged, their expectations are tougher than ever for a business to keep up with. They are empowered like never before and expect businesses to respect that sense of empowerment - lashing out at those that don’t. Take heart: Old-fashioned customer service, fully retooled for today’s blistering pace and digitally connected reality, is what you need to build the kind of loyal customer base that allows you to survive - and thrive.
-
-
This is the book that cracks the code!
- By Nick Morgan on 04-30-13
By: Micah Solomon
-
Big Data in Practice
- How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
- By: Bernard Marr
- Narrated by: Piers Hampton
- Length: 7 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data. Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This book fills the knowledge gap by showing how major companies are using big data every day, from an up-close, on-the-ground perspective.
-
-
Good book for managers
- By Capnbody on 01-08-18
By: Bernard Marr
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
@War
- The Rise of the Military-Internet Complex
- By: Shane Harris
- Narrated by: Stephen R. Thorne
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- By Greg on 02-06-15
By: Shane Harris
-
The Mobile Wave
- How Mobile Intelligence Will Change Everything
- By: Michael Saylor
- Narrated by: LJ Ganser
- Length: 8 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Mobile Wave argues that the changes brought by mobile computing are so big and widespread that it’s impossible for us to see it all, even though we are all immersed in it. Saylor explains that the current generation of mobile smart phones and tablet computers has set the stage to become the universal computing platform for the world. In the hands of billions of people and accessible anywhere and anytime, mobile computers are poised to become an appendage of the human being and an essential tool for modern life.
-
-
Commonplace knowledge peppered with buzzwords
- By Amazon Customer on 10-22-13
By: Michael Saylor
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Googled
- The End of the World as We Know It
- By: Ken Auletta
- Narrated by: Jim Bond
- Length: 13 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Googled, esteemed media writer and critic Ken Auletta uses the story of Google's rise to explore the inner workings of the company and the future of the media at large. Although Google has often been secretive, this book is based on the most extensive cooperation ever granted a journalist, including access to closed-door meetings and interviews with founders Larry Page and Sergey Brin, CEO Eric Schmidt, and some 150 present and former employees.
-
-
Audio production could have been better
- By David on 11-12-09
By: Ken Auletta
What listeners say about Hacked Again
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Mike Harris
- 08-24-16
An excellent listen and read
Where does Hacked Again rank among all the audiobooks you’ve listened to so far?
Excellent in security area with good insights on his company getting hacked
Who was your favorite character and why?
NA
Have you listened to any of John Pruden’s other performances before? How does this one compare?
No
If you were to make a film of this book, what would the tag line be?
Anyone can be hacked
Any additional comments?
I read this book over three days after being given a free download by it's author Scott (full disclosure). Its a good and fast read that is designed more for business owners, business managers and the general public (at least in my opinion) more than IT security people. Filled with good sound advice throughout the book and sharing the knowledge on how Scott and his company were hacked in the past and how they responded to the Hacks to get back control of their money and systems. I have recommended this book to a couple of IT colleagues who have read the book already and found it very valuable in helping to set some basic rules for themselves.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Peter
- 08-24-16
Essential cyber security reading
Would you recommend this audiobook to a friend? If so, why?
I would recommend this book to all of my friends in the tech community. It's a great introduction to the vast array of cyber threats and provides some good tips on security your private information.
What was one of the most memorable moments of Hacked Again?
The fact that the author, who is a superstar in the cyber security world, admits to being hacked (a few times at that) is really refreshing. It lets you know that the threats out there are real and they can - and will - happen to anybody, so take them seriously. It would be easy for Scott Schober to say that he's beyond hacker's reach, but he was honest and I really appreciated that.
What about John Pruden’s performance did you like?
He did an okay job. It took a long time to get used to his voice/reading style. Kind of annoying at first, but the content was so good, it helped me move past my hangups.
Was there a moment in the book that particularly moved you?
I don't really have a specific part that moved me. It was consistently solid throughout.
Any additional comments?
This is a great introduction to the threats that exist in today's world. Many topics are covered, and this book is a great first step to mastering cyber security.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Matt
- 01-06-17
A highly practical introduction to cyber security
Hacked Again is easy to digest and understand. The author, Scott, recalls his own misfortune as a victim of hackers. Scott is a cyber security expert (yes, that's right, they get hacked too) and shares a wealth of knowledge that may be used as valuable security advice for both your personal or business information.
I thoroughly enjoyed the stories shared and certainly follow some of the advice myself. This is a book I will happily return to.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Liana
- 08-07-16
Excellent overview
This is a good introduction for the public to the importance of cyber security awareness. The author uses his own experiences to draw the listener / reader in, and conveys the harsh real world implications of corporate failure to protect our personal data. Highly recommended for small and medium business owners, and everyone who thinks '123456' is an acceptable password.
I enjoyed the narration as much as the story and information. Well done.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Jeremy
- 08-25-16
Interesting Listen
Hacked Again is an interesting read for individuals and small businesses who are not overly familiar with cyber security best practices. The stories Scott shares are certainly entertaining and he effectively shows how cyber attacks can happen to anyone.
As someone in the Cybersecurity space providing services to enterprises, I have heard of many of these techniques, but it was also interesting to hear a different perspective based on Scott's experience. Definitely with a listen!
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Story
- David M. Salamack
- 10-15-16
stories from the front line
Mr. Schober writes from being there on the front lines of cybercrime fighting. Thrust into this role by the criminals themselves, he tells the tales in a language that is technical and accessible to those outside the tech field. These firsthand accounts are a great example of what is really going on. It also contains proven techniques to protect the average person from becoming another cybercrime statistic.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Patrick Branch
- 11-10-16
Something Everyone Should Hear
What did you love best about Hacked Again?
Scott Shober's hacked again was very well written and the narration on the audible version was equally was great. The book goes over the very basics of modern security such as how not to write a password before going into more advanced topics and describes some infamous hacks and how they could have been prevented. The book seems to be targeted toward mainly toward business owners, but I highly recommend this to anyone using modern technology.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Donn Edwards
- 08-03-16
You really need to take this book seriously.
I disagree with a few of the author's opinions (especially about LastPass), but this book is still a great resource, especially in its ability to make people aware of security issues without getting too geeky and technical.
Sometimes its a bit frustrating because he recommends "adopting best practices" without giving any details on what they should be. But it's difficult finding a balance between too much and too little information, and in most cases Scott Schober has found that balance, especially for a less technical audience.
Take it seriously. "If you're happy with your security, then so are the bad guys"
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Rob
- 01-26-19
Sorta interesting but a bit boasty
He spends just as much time boasting as he does giving advice. Its in a way too ego and an advertisement of his company. Despite his efforts to sway you otherwise.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Stephen R MacEwen
- 09-06-16
Great perspective for the uninitiated.
What made the experience of listening to Hacked Again the most enjoyable?
Hacked Again is an easy listen that will resonate most with individuals not deeply familiar with cyber security. For that audience, the book provides excellent insights and advice that will clearly help people to take steps to secure themselves online. Scott’s use of personal examples, including the sharing of cases where he himself was hacked, is compelling. More awareness of these risks and how to manage them is needed, and Scott’s book helps to fill this gap.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!