Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Similar Podcasts

24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.

CppCast
Every two weeks, or so, we sit down with guests from the C++ community to discuss the latest news and what they have been up to. Find us at cppcast.com

The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.
EP58: How is Spyware Legal?
Today's Cyber Stalkers have free access to almost government-grade spyware software with which they can terrorize their victims. Who's enabling the commercial spyware market? Advertising Inquiries: https://redcircle.com/brands
Listeners Survey Special
Ran and Eliad Kimhi, one of the show's top producers, discuss the recent Listener's Survey results: what do like and dislike about the show, ideas you gave us for future improvements - and what do our listeners think about Ran's accent?...
EP57: Listeners Survey Special
Ran and Eliad Kimhy, one of the show's top producers, discuss the recent Listener's Survey results: what do like and dislike about the show, ideas you gave us for future improvements - and what do our listeners think about Ran's accent?...Advertising Inquiries: https://redcircle.com/brands
Operation Aurora, Part 2
Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his own name - and wasn't happy with the search results?...
EP56: Operation Aurora, Part 2
Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his own name - and wasn't happy with the search results?... Advertising Inquiries: https://redcircle.com/brands
Operation Aurora, Part 1
In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and often turbulent relationship between the world's largest internet company, and the world's most populated nation.
EP55: Operation Aurora, Part 1
In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and often turbulent relationship between the world's largest internet company, and the world's most populated nation. Advertising Inquiries: https://redcircle.com/brands
Responding to a Cyber Attack with Missiles
Is the use of deadly force a legitimate – and practical – response to cyber attacks? what lessons did Israel learn from the Yom Kippur War of 1973 about the best way to manage it’s offensive cyber units? How can governments ‘signal’ to their opponents their cyber power, without actually deploying cyber weapons? Join us […]
Responding to a Cyber Attack with Missiles
Should governments responde to cyber attack with deadly force? Senior researcher Mikko Hypponen and Prof. Itzik Ben Israel (Ret. General, IDF R&D) discuss this sensative question.Advertising Inquiries: https://redcircle.com/brands
Are Ad Blockers Malicious?
Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by some blockers present us with a moral dilemma.
EP53: Are Ad Blockers Malicious?
Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by some blockers present us with a moral dilemma. Advertising Inquiries: https://redcircle.com/brands
Conficker
Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure.
ML_Conficker
Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure. Advertising Inquiries: https://redcircle.com/brands
Operation SoftCell
A rare, inside look, at how Cybereason's researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the world.Advertising Inquiries: https://redcircle.com/brands
Operation SoftCell
A rare, inside look, at how Cybereason's researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the world.