A talented Russian hacker is hired to cripple Singapore with a cyberattack. Wendy Chen and Guy Andersons life had returned to normal. Their exploits in North Korea, where they had neutralised a malware designed to trigger a missile attack on Japan now seemed like a distant dream. But for Wendy, this was to turn into a nightmare when she encountered Talon, a Korean assassin in Singapore. With help from Plug, their friend at MI6 in Hong Kong, the trio unravel a sophisticated cyberattack designed to economically cripple Singapore, and Wendy once again finds herself face-to-face with her nemesis.From the author: Following the original adventures of Wendy and Guy, in Attack Vector, I took the opportunity to use them again in my second book Deadly Protocol. Again, I've used real-world scenarios of hackers and data breaches to create the bedrock for the stories told here. State based cyberattacks are becoming common place and in all likelihood will eventually replace conventional war. Hackers can easily target the critical infrastructure of a country by hacking the water supply, sewerage, power generation and distribution supply and the telecom's structure. In this book we see Wendy and Guy again drawn into a conflict involving sophisticated hackers and contract killers. I hope you enjoy reading this book as much as I enjoyed writing it.
A talented Russian hacker is hired to cripple Singapore with a cyberattack. Wendy Chen and Guy Andersons life had returned to normal. Their exploits in North Korea, where they had neutralised a malware designed to trigger a missile attack on Japan now seemed like a distant dream. But for Wendy, this was to turn into a nightmare when she encountered Talon, a Korean assassin in Singapore. With help from Plug, their friend at MI6 in Hong Kong, the trio unravel a sophisticated cyberattack designed to economically cripple Singapore, and Wendy once again finds herself face-to-face with her nemesis.From the author: Following the original adventures of Wendy and Guy, in Attack Vector, I took the opportunity to use them again in my second book Deadly Protocol. Again, I've used real-world scenarios of hackers and data breaches to create the bedrock for the stories told here. State based cyberattacks are becoming common place and in all likelihood will eventually replace conventional war. Hackers can easily target the critical infrastructure of a country by hacking the water supply, sewerage, power generation and distribution supply and the telecom's structure. In this book we see Wendy and Guy again drawn into a conflict involving sophisticated hackers and contract killers. I hope you enjoy reading this book as much as I enjoyed writing it.