53 books like The Ransomware Hunting Team

By Renee Dudley, Daniel Golden,

Here are 53 books that The Ransomware Hunting Team fans have personally recommended if you like The Ransomware Hunting Team. Shepherd is a community of 11,000+ authors and super readers sharing their favorite books with the world.

Shepherd is reader supported. When you buy books, we may earn an affiliate commission.

Book cover of SuperSight: What Augmented Reality Means for Our Lives, Our Work, and the Way We Imagine the Future

Leslie Shannon Author Of Interconnected Realities: How the Metaverse Will Transform Our Relationship with Technology Forever

From my list on when hot new technology meets reality.

Why am I passionate about this?

I’m the Head of Trend and Innovation Scouting for Nokia, and I’ve been with the company since the glory days of Nokia mobile phone world dominance. I know first-hand what happens when a company focuses exclusively on the technology, not the humans that use it, and how quickly that can lead to disaster. One of the lessons that I see repeated continuously in the field of innovation is that a huge amount of attention gets paid to the new technology, and not nearly enough on how the technology will interact with our existing systems, beliefs, attitudes, and culture. Learning from the mistakes is the best way to make sure that the future doesn’t repeat them!

Leslie's book list on when hot new technology meets reality

Leslie Shannon Why did Leslie love this book?

While the term the “Metaverse” usually makes people think of a fully digital, immersive world, my own feeling is that technologies that bring digital information and entertainment into our physical world is a much more powerful and important arena. This leads us to the transformative and still-developing world of Augmented Reality.

David Rose of the MIT Media Lab has been working with Augmented Reality for more than a decade, and Supersight is an overview of what he's seen and what he’s learned in this time. 

What I love about Supersight is that while David is clearly as excited about this topic as I am, he’s also a realist, and openly discusses issues and challenges with Augmented Reality. Perhaps most valuable are the 14 Augmented Reality Design Principles that he outlines – super realistic, super useful.

After reading this, you’ll have a very grounded idea of the capabilities and potential of…

By David Rose,

Why should I read it?

1 author picked SuperSight as one of their favorite books, and they share why you should read it.

What is this book about?

NATIONAL INDIE EXCELLENCE AWARDS WINNER — NONFICTION • 2022 IPPY AWARDS BRONZE MEDALIST — SCIENCE

For thousands of years, human vision has been largely unchanged by evolution.

We’re about to get a software update.

Today, Apple, Google, Microsoft, Facebook, Snap, Samsung, and a host of startups are racing to radically change the way we see. The building blocks are already falling into place: cloud computing and 5G networks, AI computer vision algorithms, smart glasses and VR headsets, and mixed reality games like Pokémon GO. But what’s coming next is a fundamental shift in how we experience the world and interact…


Book cover of The History of the Future: Oculus, Facebook, and the Revolution That Swept Virtual Reality

Leslie Shannon Author Of Interconnected Realities: How the Metaverse Will Transform Our Relationship with Technology Forever

From my list on when hot new technology meets reality.

Why am I passionate about this?

I’m the Head of Trend and Innovation Scouting for Nokia, and I’ve been with the company since the glory days of Nokia mobile phone world dominance. I know first-hand what happens when a company focuses exclusively on the technology, not the humans that use it, and how quickly that can lead to disaster. One of the lessons that I see repeated continuously in the field of innovation is that a huge amount of attention gets paid to the new technology, and not nearly enough on how the technology will interact with our existing systems, beliefs, attitudes, and culture. Learning from the mistakes is the best way to make sure that the future doesn’t repeat them!

Leslie's book list on when hot new technology meets reality

Leslie Shannon Why did Leslie love this book?

If you’ve ever wondered how on Earth Mark Zuckerberg ended up betting his Facebook empire on the unproven technology of Virtual Reality (VR), this is the recent history book for you. 

Blake Harris starts with Palmer Luckey, a homeschooled teenager who shrugged off the received wisdom of all of his elders, and just went ahead and built the first commercially viable VR headset. (That’s an amazing story in itself.) And then he got Mark Zuckerberg so excited about this new experience that, yes, Zuckerberg ended up buying Luckey’s company – and eventually forcing him out.

The History of the Future is about technology, business, the consequences of acting on visionary thinking, and, above all, about how technology is ultimately created and developed by human beings. 

By Blake J. Harris,

Why should I read it?

1 author picked The History of the Future as one of their favorite books, and they share why you should read it.

What is this book about?

A USA Today bestseller

The dramatic, larger-than-life true story behind the founding of Oculus, its quest for virtual reality, and its founder's contentious battle for political freedom against Facebook, from the bestselling author of Console Wars (now a CBS All Access film).

In The History of the Future, Harris once again deep-dives into a tech drama for the ages to expertly tell the larger-than-life true story of Oculus, the virtual reality company founded in 2012 that-less than two years later-would catch the attention of Mark Zuckerberg and wind up being bought by Facebook for over $2 billion dollars.

This incredible…


Book cover of Reality Check: How Immersive Technologies Can Transform Your Business

Leslie Shannon Author Of Interconnected Realities: How the Metaverse Will Transform Our Relationship with Technology Forever

From my list on when hot new technology meets reality.

Why am I passionate about this?

I’m the Head of Trend and Innovation Scouting for Nokia, and I’ve been with the company since the glory days of Nokia mobile phone world dominance. I know first-hand what happens when a company focuses exclusively on the technology, not the humans that use it, and how quickly that can lead to disaster. One of the lessons that I see repeated continuously in the field of innovation is that a huge amount of attention gets paid to the new technology, and not nearly enough on how the technology will interact with our existing systems, beliefs, attitudes, and culture. Learning from the mistakes is the best way to make sure that the future doesn’t repeat them!

Leslie's book list on when hot new technology meets reality

Leslie Shannon Why did Leslie love this book?

Of all the books out there about the immersive technologies of virtual and augmented reality, Jeremy’s take on the subject is the one that looks the most closely at the security issues involved, especially when it comes to enterprise deployments. 

If you’re thinking about leveraging the awesome power of these technologies in your workplace, Jeremy’s hands-on discussion of to what to look for and what to avoid is an invaluable guide.

By Jeremy Dalton,

Why should I read it?

1 author picked Reality Check as one of their favorite books, and they share why you should read it.

What is this book about?

Discover THE next big competitive advantage in business: learn how augmented and virtual reality can put your business ahead. Augmented reality (AR) and virtual reality (VR) are part of a new wave of immersive technologies that offer huge opportunities for businesses, across industries and regardless of their size. Most people think of AR or VR as a new development in video gaming like Pokemon GO, or an expensive marketing campaign by the Nikes of the world. The truth is, businesses of any size can put these new technologies to immediate use in areas that include: - Learning and development -…


Book cover of You've Been Played: How Corporations, Governments, and Schools Use Games to Control Us All

Leslie Shannon Author Of Interconnected Realities: How the Metaverse Will Transform Our Relationship with Technology Forever

From my list on when hot new technology meets reality.

Why am I passionate about this?

I’m the Head of Trend and Innovation Scouting for Nokia, and I’ve been with the company since the glory days of Nokia mobile phone world dominance. I know first-hand what happens when a company focuses exclusively on the technology, not the humans that use it, and how quickly that can lead to disaster. One of the lessons that I see repeated continuously in the field of innovation is that a huge amount of attention gets paid to the new technology, and not nearly enough on how the technology will interact with our existing systems, beliefs, attitudes, and culture. Learning from the mistakes is the best way to make sure that the future doesn’t repeat them!

Leslie's book list on when hot new technology meets reality

Leslie Shannon Why did Leslie love this book?

Adrian Hon is the founder of the truly fabulous fitness app Zombies, Run, in which you listen to a story in which you are a character as you run or walk to work out. 

Yes, there was a zombie apocalypse in this story, and every so often, the zombies appear – and you have to run!! (I didn’t know about Zombies, Run before I read this book, but I have since started using it, and I love it!)  

Adrian has been in the gaming world for a long time, and he is highly aware of how gaming can become coercive. He built Zombies, Run specifically to avoid coercion of any kind, but is deeply infuriated by all of the games out there that shamelessly continue to rely on coercion to generate usage and, of course, cash. 

In You’ve Been Played, Adrian outlines just how nasty some techniques can be,…

By Adrian Hon,

Why should I read it?

1 author picked You've Been Played as one of their favorite books, and they share why you should read it.

What is this book about?

How games are being harnessed as instruments of exploitation - and what we can do about it

Warehouse workers pack boxes while a virtual dragon races across their screen. If they beat their colleagues, they get an award. If not, they can be fired. Uber presents exhausted drivers with challenges to keep them driving. China scores its citizens so they behave well, and games with in-app purchases use achievements to empty your wallet.

Points, badges and leaderboards are creeping into every aspect of modern life. In You've Been Played, game designer Adrian Hon delivers a blistering takedown of how corporations,…


Book cover of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Jeremy N. Smith Author Of Breaking and Entering: The Extraordinary Story of a Hacker Called Alien

From my list on hackers and hacking.

Why am I passionate about this?

Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.

Jeremy's book list on hackers and hacking

Jeremy N. Smith Why did Jeremy love this book?

A famous hacker’s real-life story, told from his own perspective, Ghost in the Wires explains how criminal hackers think and act and the diverse techniques they use, no keyboard necessary—all, in this case, with little motive beyond a compulsion to explore and exploit. The hacking community has no bigger characters than Kevin Mitnick and no better first-person accounts of the art of “social engineering,” or human hacking—manipulating people (including, in Mitnick’s case, the FBI and other would-be pursuers) to your own advantage.

By William L. Simon, Kevin Mitnick,

Why should I read it?

1 author picked Ghost in the Wires as one of their favorite books, and they share why you should read it.

What is this book about?

In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale).

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated…


Book cover of SafeCyberHome: Protect Your Family From Fraud, Identity Theft and Computer Hackers

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

SafeCyberHome focuses on understanding how corporations and governments collect and use our personal data. The book also gives strategies for opting out of this data collection whenever possible. And, where it is not possible to opt-out, the book gives clear explanations on why we should be as restrictive with our personal data as possible. Vancannon uses an example similar to one from my own book: if someone is really determined to get your data, they will. But if they’re just looking for an easy target, and you’re not one, they’ll move on. Same reason you lock your front door – a determined master thief can defeat even the best lock, if they really want to – but do you want to make your house the easiest target on the block?

By Billy VanCannon,

Why should I read it?

1 author picked SafeCyberHome as one of their favorite books, and they share why you should read it.

What is this book about?

Online security and data privacy is one of the most pressing yet misunderstood issues of our time.

Today we use the internet to shop, work, learn, and be entertained. At the same time, we leave a trail that others can use to steal from us, assume our identity to commit crimes in our names, and hack our computers. If you ever felt helpless because governments and corporations can’t protect themselves with all their resources, then this book is for you. The vast majority of fraud and cybercrime can be stopped with basic knowledge about how your data is collected and…


Book cover of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

It is a reporter’s account of a cybersecurity entrepreneur stumbling into criminal and nation-state level cyberattacks, assisting in the investigation, and ultimately becoming a target. The writing is clear and accessible to the non-technical reader but it still conveys a good sense of what it is like to witness and investigate cyber-crime. It is a suspenseful human drama.

By Joseph Menn,

Why should I read it?

1 author picked Fatal System Error as one of their favorite books, and they share why you should read it.

What is this book about?

In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defence secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the…


Book cover of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Steve Vigdor Author Of Signatures of the Artist: The Vital Imperfections That Make Our Universe Habitable

From my list on science that should inform public policy.

Why am I passionate about this?

I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy. 

Steve's book list on science that should inform public policy

Steve Vigdor Why did Steve love this book?

I love this book because Perlroth chronicles the proliferation of cyberweapons, which began in the hands of mischievous young hackers exploiting vulnerabilities in widely used software. Once some of those hackers joined the NSA, their tools were developed into sophisticated weapons to undercut technological developments in enemy states like Iran.

Once NSA’s hacks leaked to the wider world, they spawned an arms race and fueled rampant criminal ransomware attacks on vulnerable institutions. Informed by Perlroth’s book, I see a future in which dwindling human fertility and the ballooning costs of advanced weaponry will enhance the military role of cyber-attacks, leading to Mutually Assured Cyber Destruction, in which many countries have cyberweapons deeply embedded in the critical infrastructure of their adversaries, just waiting to activate them.

By Nicole Perlroth,

Why should I read it?

2 authors picked This Is How They Tell Me the World Ends as one of their favorite books, and they share why you should read it.

What is this book about?

THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)

"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…


Book cover of Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

Ever wondered what Russian hackers have been up to over the last few years? I found this a really sobering read, but at the same time, I loved hearing the stories of the people who work so hard to keep us safe.

Hackers are usually pretty big nerds, so it’s not really surprising that the title of this book comes from how cybercriminals embedded references to Frank Herbert’s book Dune into the code they used to carry out cyberattacks against Ukraine and other countries.

By Andy Greenberg,

Why should I read it?

1 author picked Sandworm as one of their favorite books, and they share why you should read it.

What is this book about?

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy

The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times).

In 2014, the world witnessed the start of a…


Book cover of Warcross

Candace Kade Author Of Enhanced: Volume 1

From my list on young adult near future novels.

Why am I passionate about this?

My family moved from America to rural China when I was four. We never stayed in one place for very long. Ever since, I’ve been searching for home in books and countries around the world. The themes of home, belonging, and identity are important ones to me that I explore in my young adult novels. My love of travel, martial arts, and tech also lend themselves well to writing fast-paced adventure books with epic battles and fight scenes. I hope you enjoy the novels on this list as much as I do!

Candace's book list on young adult near future novels

Candace Kade Why did Candace love this book?

Warcross hooked me from page one and never let go.

First off, the near future American and Japanese settings were super fun to explore. Secondly, there were hackers, dark web bounty hunters, and virtual reality games—I mean, come on!

This book had all the fun tropes that I love in a series. 

By Marie Lu,

Why should I read it?

3 authors picked Warcross as one of their favorite books, and they share why you should read it. This book is for kids age 12, 13, 14, and 15.

What is this book about?

Perfect for fans of Ready Player One!

From #1 New York Times bestselling author Marie Lu - when a game called Warcross takes the world by storm, one girl hacks her way into its dangerous depths.

For the millions who log in every day, Warcross isn't just a game - it's a way of life. Struggling to make ends meet, teenage hacker Emika Chen works as a bounty hunter, tracking down players who bet on the game illegally. Needing to make some quick cash, Emika takes a risk and hacks into the opening game of the international Warcross Championships -…


5 book lists we think you will like!

Interested in cyber crimes, computer security, and the FBI?

Cyber Crimes 14 books
The FBI 124 books