Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

Similar Podcasts

The Infinite Monkey Cage

The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.

The Top Shelf

The Top Shelf
ThePrimeagen and teej_dv are on a quest to find the best possible technical speakers and ask the best possible questions we can find. You all know ThePrimeagen can't read, so this is a great format for him to really shine. Teej is here to make sure that Prime knows who the guest is and also to interrupt Prime wherever possible

24H24L

24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.

EP57: Listeners Survey Special

October 10, 2019 0:28:32 27.39 MB Downloads: 0

Ran and Eliad Kimhy, one of the show's top producers, discuss the recent Listener's Survey results: what do like and dislike about the show, ideas you gave us for future improvements - and what do our listeners think about Ran's accent?...Advertising Inquiries: https://redcircle.com/brands

Operation Aurora, Part 2

September 26, 2019 32:51 31.53 MB Downloads: 0

Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his own name - and wasn't happy with the search results?...

EP56: Operation Aurora, Part 2

September 26, 2019 0:32:50 31.53 MB Downloads: 0

Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his own name - and wasn't happy with the search results?... Advertising Inquiries: https://redcircle.com/brands

Operation Aurora, Part 1

September 12, 2019 34:05 32.71 MB Downloads: 0

In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and often turbulent relationship between the world's largest internet company, and the world's most populated nation.

EP55: Operation Aurora, Part 1

September 12, 2019 0:34:04 32.71 MB Downloads: 0

In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and often turbulent relationship between the world's largest internet company, and the world's most populated nation. Advertising Inquiries: https://redcircle.com/brands

Responding to a Cyber Attack with Missiles

August 29, 2019 55:12 52.99 MB Downloads: 0

Is the use of deadly force a legitimate – and practical – response to cyber attacks? what lessons did Israel learn from the Yom Kippur War of 1973 about the best way to manage it’s offensive cyber units? How can governments ‘signal’ to their opponents their cyber power, without actually deploying cyber weapons? Join us […]

Responding to a Cyber Attack with Missiles

August 29, 2019 0:55:12 52.99 MB Downloads: 0

Should governments responde to cyber attack with deadly force? Senior researcher Mikko Hypponen and Prof. Itzik Ben Israel (Ret. General, IDF R&D) discuss this sensative question.Advertising Inquiries: https://redcircle.com/brands

Are Ad Blockers Malicious?

August 15, 2019 33:22 32.02 MB Downloads: 0

Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by some blockers present us with a moral dilemma.

EP53: Are Ad Blockers Malicious?

August 15, 2019 0:33:21 32.02 MB Downloads: 0

Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by some blockers present us with a moral dilemma. Advertising Inquiries: https://redcircle.com/brands

Conficker

July 18, 2019 40:16 38.65 MB Downloads: 0

Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure.

ML_Conficker

July 18, 2019 0:40:15 38.65 MB Downloads: 0

Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure. Advertising Inquiries: https://redcircle.com/brands

Operation SoftCell

July 10, 2019 0:34:17 32.92 MB Downloads: 0

A rare, inside look, at how Cybereason's researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the world.Advertising Inquiries: https://redcircle.com/brands

Operation SoftCell

July 04, 2019 34:18 32.92 MB Downloads: 0

A rare, inside look, at how Cybereason's researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the world.

'Pa Bell' Vs. Youth International Party Line

June 16, 2019 0:40:04 38.46 MB Downloads: 0

The YIPL phreaking magazine was the spiritual predecessor to the better-known '2600' zine, and it was founded by a ideological party determined to bring down the largest monopoly in US history: Bell Telephone.Advertising Inquiries: https://redcircle.com/brands

‘Pa Bell’ Vs. Youth International Party Line

June 13, 2019 40:04 38.46 MB Downloads: 0

The YIPL phreaking magazine was the spiritual predecessor to the better-known '2600' zine, and it was founded by a ideological party determined to bring down the largest monopoly in US history: Bell Telephone.