Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Similar Podcasts
The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.
The Top Shelf
ThePrimeagen and teej_dv are on a quest to find the best possible technical speakers and ask the best possible questions we can find. You all know ThePrimeagen can't read, so this is a great format for him to really shine. Teej is here to make sure that Prime knows who the guest is and also to interrupt Prime wherever possible
24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.
EP57: Listeners Survey Special
Ran and Eliad Kimhy, one of the show's top producers, discuss the recent Listener's Survey results: what do like and dislike about the show, ideas you gave us for future improvements - and what do our listeners think about Ran's accent?...Advertising Inquiries: https://redcircle.com/brands
Operation Aurora, Part 2
Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his own name - and wasn't happy with the search results?...
EP56: Operation Aurora, Part 2
Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his own name - and wasn't happy with the search results?... Advertising Inquiries: https://redcircle.com/brands
Operation Aurora, Part 1
In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and often turbulent relationship between the world's largest internet company, and the world's most populated nation.
EP55: Operation Aurora, Part 1
In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and often turbulent relationship between the world's largest internet company, and the world's most populated nation. Advertising Inquiries: https://redcircle.com/brands
Responding to a Cyber Attack with Missiles
Is the use of deadly force a legitimate – and practical – response to cyber attacks? what lessons did Israel learn from the Yom Kippur War of 1973 about the best way to manage it’s offensive cyber units? How can governments ‘signal’ to their opponents their cyber power, without actually deploying cyber weapons? Join us […]
Responding to a Cyber Attack with Missiles
Should governments responde to cyber attack with deadly force? Senior researcher Mikko Hypponen and Prof. Itzik Ben Israel (Ret. General, IDF R&D) discuss this sensative question.Advertising Inquiries: https://redcircle.com/brands
Are Ad Blockers Malicious?
Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by some blockers present us with a moral dilemma.
EP53: Are Ad Blockers Malicious?
Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by some blockers present us with a moral dilemma. Advertising Inquiries: https://redcircle.com/brands
Conficker
Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure.
ML_Conficker
Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure. Advertising Inquiries: https://redcircle.com/brands
Operation SoftCell
A rare, inside look, at how Cybereason's researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the world.Advertising Inquiries: https://redcircle.com/brands
Operation SoftCell
A rare, inside look, at how Cybereason's researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the world.
'Pa Bell' Vs. Youth International Party Line
The YIPL phreaking magazine was the spiritual predecessor to the better-known '2600' zine, and it was founded by a ideological party determined to bring down the largest monopoly in US history: Bell Telephone.Advertising Inquiries: https://redcircle.com/brands
‘Pa Bell’ Vs. Youth International Party Line
The YIPL phreaking magazine was the spiritual predecessor to the better-known '2600' zine, and it was founded by a ideological party determined to bring down the largest monopoly in US history: Bell Telephone.