Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Similar Podcasts
The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.
The Top Shelf
ThePrimeagen and teej_dv are on a quest to find the best possible technical speakers and ask the best possible questions we can find. You all know ThePrimeagen can't read, so this is a great format for him to really shine. Teej is here to make sure that Prime knows who the guest is and also to interrupt Prime wherever possible
24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.
The Huawei Ban, Part 2
At the end of our last episode, it kind of seemed like Huawei--the Chinese telecommunications company accused of aiding in state cyberspying--was completely innocent. They were being accused of crimes they may not have committed, based on evidence that largely did not exist. The conspiracies around them seemed unfair at best, malicious at worst. But there’s another side to this story, of course. Huawei didn’t end up on people’s radars for no reason. They’ve earned their notoriety.
Steven Wozniak Interview, Deep 2017
Steven Wozniak Interview, Deep 2017Advertising Inquiries: https://redcircle.com/brands
The Hauwei Ban, Part 2
The Hauwei Ban, Part 2Advertising Inquiries: https://redcircle.com/brands
The Huawei Ban, Part 1
Over the past 20 years, western governments have accused Huawei of everything from IP theft to financial fraud to cyber spying. Often, these claims are made either with no evidence, or only circumstantial evidence. Is Huawei really a national security threat, or are they a political scapegoat?
The Huawei Ban, Part 1
The Huawei Ban, Part 1Advertising Inquiries: https://redcircle.com/brands
The Max Headroom Signal Hijack
On November 22nd, 1987, a hacker took over the signals of two Chicago-area TV stations and broadcast two bizarre and somewhat vulgar messages. In this episode we explore this notorious hack, and its implications on the nature of hacking in general.
The Max Headroom Signal Hijack
The Max Headroom Signal HijackAdvertising Inquiries: https://redcircle.com/brands
ToTok, Part 3: Becoming a Spyware Superpower
The fact that ToTok came out of the United Arab Emirates is no surprise: in recent years, the UAE has deployed some of the most sophisticated mobile device exploits ever seen. But they got a lot of help from one country in particular... today’s episode is about the UAE. But it’s really about the Americans.
ToTok, Part 3: Becoming a Spyware Superpower
ToTok, Part 3: Becoming a Spyware SuperpowerAdvertising Inquiries: https://redcircle.com/brands
Operation Glowing Symphony
Operation Glowing SymphonyAdvertising Inquiries: https://redcircle.com/brands
ToTok, Part 2: The Masterminds of Mobile Malware
The corporate structure supporting ToTok involved at least half a dozen real companies, shell companies and intelligence groups, with the individuals who actually operated the app being hidden behind other individuals given sinecure jobs and ponied around to the public as the supposed developers. Ultimately, though, every path that begins with ToTok ends with one very rich and powerful man at the heart of the Emirati state. His name is Sheikh Tahnoon bin Zayed al-Nahyan.
ToTok, Part 2: The Masterminds of Mobile Malware
ToTok, Part 2: The Masterminds of Mobile MalwareAdvertising Inquiries: https://redcircle.com/brands
ToTok, Part 1: How to Convince Someone to Download Spyware
Only a few months after its release, ToTok - an ordinary messaging app, with no exceptional features - had over five million downloads, and held the number 4 position in Apple's App Store global charts. So what was it that made ToTok so popular, so quickly? The answer: nothing good.
ToTok, Part 1: How to Convince Someone to Download Spyware
ToTok, Part 1: How to Convince Someone to Download SpywareAdvertising Inquiries: https://redcircle.com/brands
How To Defend A Bank, Part 2: Right Of Bang
As much as we can imagine what it’s like to be a defender in a cyber-conflict, we don’t really know what it is - unless we’re in the shoes the time of it happening. That's what simulations are for.