Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

Similar Podcasts

The Infinite Monkey Cage

The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.

The Top Shelf

The Top Shelf
ThePrimeagen and teej_dv are on a quest to find the best possible technical speakers and ask the best possible questions we can find. You all know ThePrimeagen can't read, so this is a great format for him to really shine. Teej is here to make sure that Prime knows who the guest is and also to interrupt Prime wherever possible

24H24L

24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.

LabMD Vs. The FTC

October 31, 2022 0:39:04 37.5 MB Downloads: 0

LabMD Vs. The FTCAdvertising Inquiries: https://redcircle.com/brands

What Would Happen if CBS Got Hacked? [ML BSide]

October 24, 2022 22:14 21.33 MB Downloads: 0

Media companies probably get hacked no more than other, non-media oriented organizations such as hospitals, banks, etc. But these hacks are often more visible and more memorable because… well, media companies are more public facing by their very nature. How can these organizations be hacked, and why should we care about such attacks? Nate Nelson spoke with Joel Molinoff, former chief information risk officer for CBS Corporation, and Dan Vasile, former vice president of information security at Paramount.

What Would Happen if CBS Got Hacked? [ML BSide]

October 24, 2022 0:22:13 21.33 MB Downloads: 0

What Would Happen if CBS Got Hacked? [ML BSide]Advertising Inquiries: https://redcircle.com/brands

Hacking Stock Markets, Part 2

October 18, 2022 29:43 28.52 MB Downloads: 0

Financial markets make good targets for criminals: after all, that's where the big money is. Surprisingly, many of these criminals are not your run-of-the-mill black hat hacker, but brokers registered with the SEC: Genuine finance industry professionals.

Hacking Stock Markets, Part 2

October 18, 2022 0:29:42 28.52 MB Downloads: 0

Hacking Stock Markets, Part 2Advertising Inquiries: https://redcircle.com/brands

Vishing: Voice Scams [ML BSide]

October 10, 2022 25:23 24.36 MB Downloads: 0

Authentication has come a long way since the 1980s or 90s. But when it comes to phone calls - we’re still in the Middle Ages. Vishing, or Voice Scams, are probably as old as the Telephone itself, yet it is still very easy to impersonate someone over the phone or spoof a phone call’s origin. Rachel Tobac is a hacker and the CEO of SocialProof Security, where she helps people and companies keep their data safe by training and pen-testing them on social engineering risks. Rachel spoke with Nate Nelson, our Sr. producer, about Vishing: how common is it, where attackers get the information they need to impersonate someone from, and the many many psychological tricks they can employ to fool the person on the other side of the call.

Vishing: Voice Scams [ML BSide]

October 10, 2022 0:25:22 24.36 MB Downloads: 0

Vishing: Voice Scams [ML BSide]Advertising Inquiries: https://redcircle.com/brands

Hacking Stock Markets, Part 1

October 04, 2022 29:57 28.74 MB Downloads: 0

In any trading market, at any time in history, no matter where you are, the most important thing you can possess isn’t actually money, or influence, or anything like that. Knowledge -- in particular, knowing something before everybody else -- is far more valuable. Some traders are willing to go to great lengths to get it before anyone else. In some cases, they’ll apply great ingenuity to the problem - but in others, they’ll use manipulation -- hacking into these technologies to gain an unfair advantage, and make a fortune along the way.

Hacking Stock Markets, Part 1

October 04, 2022 0:29:56 28.74 MB Downloads: 0

Hacking Stock Markets, Part 1Advertising Inquiries: https://redcircle.com/brands

What’s it’s Like to Fight LulzSec [ML B-Side]

September 27, 2022 24:24 23.42 MB Downloads: 0

The name Lulzsec is probably very familiar to listeners who were around in 2011, when this hacking group was at the peak of its nefarious activity. As their name implies, Lulzsec was known for trolling their victims: their childish behavior might have fooled some people into thinking that Lulzsec was mostly harmless - but as the story you’re about to hear will show, they were anything but.

What’s it's Like to Fight LulzSec [ML B-Side]

September 27, 2022 0:24:23 23.42 MB Downloads: 0

What’s it's Like to Fight LulzSec [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

“King Kimble”: Kim DotCom

September 19, 2022 32:49 31.5 MB Downloads: 0

The US government says that Kim Schmitz, better know as Kim DotCom, is the leader of a file sharing crime ring. He sees himself as a an internet freedom fighter: a fugitive on the run from vindictive overly-powerful governments. Can King Kimble escape the wrath of the USA?

"King Kimble": Kim DotCom

September 18, 2022 0:32:49 31.5 MB Downloads: 0

The US government says that Kim Schmitz, better know as Kim DotCom, is the leader of a file sharing crime ring. He sees himself as a an internet freedom fighter: a fugitive on the run from vindictive overly-powerful governments. Can King Kimble escape the wrath of the USA? Advertising Inquiries: https://redcircle.com/brands

Hacking Multi-Factor Authentication [ML B-side]

September 13, 2022 26:06 25.06 MB Downloads: 0

Multi-Factor Authentication (MFA) is usually considered a better solution for authentication than just using passwords. But Roger Grimes, a veteran security professional, and a Data-Driven Defense Evangelist claims that the sense of security current MFA solutions provides us - is false.

Hacking Multi-Factor Authentication

September 13, 2022 0:26:06 25.06 MB Downloads: 0

Multi-Factor Authentication (MFA) is usually considered a better solution for authentication than just using passwords. But Roger Grimes, a veteran security professional, and a Data-Driven Defense Evangelist claims that the sense of security current MFA solutions provides us - is false. Advertising Inquiries: https://redcircle.com/brands