The Enigma Wraith (The Enigma Series Book 4)

How can older hydroelectric plants like the one in Brazil be exploited by a virus that triggers a flood threatening significant losses to people and property? Smart cars are taking advantage of built in safety specifications, but is it really just a trap? What could possibly cause all the funds from an Irish financial institution to vanish? Could a NATO base in Europe be infected with a mysterious yet untraceable code that sends all of their combat supplies to the wrong location? What happens when your plane’s on-board computers tell you they belong to someone else while in flight? Are these all a glimpse of the new viral danger of the Ghost Code designed for devastation on a personal and industrial level?
n
nA new mysterious pair of cyber pirates, known only as Mephisto and Callisto, plot to deliver their destructive payloads for computing control. Worse, the code has been trained to evade detection and wreak havoc on its target victims. And while their agenda appears to be a blackmail plot for financial gain, their true goals are far more menacing and capricious in nature.
n
nIn an intriguing game of digital cat and mouse with assassins from the Dark Net, the R-Group’s technology experts are brought in to make sense of the individual issues and maybe stitch together a larger view of the problem. Jacob, Petra, and Quip find themselves pitted against their most nefarious enemies to date. Stretching their considerable talents to the max, they struggle to track down the source of the Ghost Code and craft a solution that can secure the world’s technology infrastructure before it completely collapses.
n
nIn the fourth book of the Enigma Series, The Enigma Wraith, the R-Group team expands their computing power to assist their brilliant technologists. The award-winning authors, Breakfield and Burkey, serve up yet another captivating techno-thriller novel racing forward with romance, humor, to the looming catastrophe.

Description

How can older hydroelectric plants like the one in Brazil be exploited by a virus that triggers a flood threatening significant losses to people and property? Smart cars are taking advantage of built in safety specifications, but is it really just a trap? What could possibly cause all the funds from an Irish financial institution to vanish? Could a NATO base in Europe be infected with a mysterious yet untraceable code that sends all of their combat supplies to the wrong location? What happens when your plane’s on-board computers tell you they belong to someone else while in flight? Are these all a glimpse of the new viral danger of the Ghost Code designed for devastation on a personal and industrial level? n nA new mysterious pair of cyber pirates, known only as Mephisto and Callisto, plot to deliver their destructive payloads for computing control. Worse, the code has been trained to evade detection and wreak havoc on its target victims. And while their agenda appears to be a blackmail plot for financial gain, their true goals are far more menacing and capricious in nature. n nIn an intriguing game of digital cat and mouse with assassins from the Dark Net, the R-Group’s technology experts are brought in to make sense of the individual issues and maybe stitch together a larger view of the problem. Jacob, Petra, and Quip find themselves pitted against their most nefarious enemies to date. Stretching their considerable talents to the max, they struggle to track down the source of the Ghost Code and craft a solution that can secure the world’s technology infrastructure before it completely collapses. n nIn the fourth book of the Enigma Series, The Enigma Wraith, the R-Group team expands their computing power to assist their brilliant technologists. The award-winning authors, Breakfield and Burkey, serve up yet another captivating techno-thriller novel racing forward with romance, humor, to the looming catastrophe. n

n

n

About the Author

n

n

n

n

Reviews

There are no reviews yet.

Be the first to review “The Enigma Wraith (The Enigma Series Book 4)”

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.