2 Books
See allA fascinating true account of how astronomer Cliff Stoll tracked down a hacker in the early days of the internet. What begins as a 75-cent accounting discrepancy leads to an international espionage case, showing how vulnerable our computer systems were (and often still are).\n\nDespite being about events from the 1980s, the book remains relevant as a primer on both network security fundamentals and the persistent challenges of attribution and coordination in addressing cyber threats.
Newport offers a philosophy for technology use based on intentionality rather than convenience. Instead of minor tweaks to our digital habits, he advocates for a more fundamental rethinking of our relationship with technology.\n\nI found the concept of ‘digital decluttering' particularly useful - the 30-day process of stepping back from optional technologies to rediscover meaningful activities and then carefully reintroducing tech that aligns with your values.
Orwell's masterpiece feels increasingly relevant in our data-driven age. The concepts of thoughtcrime, doublethink, and the ever-watching Big Brother serve as powerful metaphors for modern surveillance culture.\n\nWhile written in 1949, the book's warnings about language manipulation, historical revisionism, and privacy invasion resonate strongly with current concerns about social media, data collection, and algorithmic control.
A comprehensive analysis of how tech companies have turned personal data into profitable assets. Zuboff coins the term ‘surveillance capitalism' to describe how our online behaviors are tracked, analyzed, and monetized.\n\nThe book offers deep insights into the mechanisms that power modern digital businesses and how they fundamentally alter the social contract.
A masterful account of the Stuxnet worm that targeted Iran's nuclear enrichment facilities. Zetter meticulously documents how this first true cyber weapon was discovered and analyzed, revealing the dawn of a new era in digital warfare.\n\nThe book reads like a thriller while providing deep technical insights and important context about the geopolitical implications of state-sponsored cyber attacks. Essential reading for understanding modern security threats.