Malicious Life - podcast cover

Malicious Life

Malicious Liferedcircle.com

Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

Episodes

The Hauwei Ban, Part 2

The Hauwei Ban, Part 2 Advertising Inquiries: https://redcircle.com/brands

Apr 23, 202037 min

The Huawei Ban, Part 1

The Huawei Ban, Part 1 Advertising Inquiries: https://redcircle.com/brands

Apr 09, 202031 min

Operation Glowing Symphony

Operation Glowing Symphony Advertising Inquiries: https://redcircle.com/brands

Mar 13, 20201 hr 14 min

Triton Part 1

Triton Part 1 Advertising Inquiries: https://redcircle.com/brands

Jan 16, 202036 min

Dead Drops

Dead Drops Advertising Inquiries: https://redcircle.com/brands

Jan 14, 202039 min

Deep Fakes, Part 2: Man Vs. Machine

Deep Fakes are set to revolutionize content creation, but alongside this technology's benefits, it also has the potential two sow havoc, fear, and distrust via Social Networks. Just this week, Facebook disclosed a network of fake users it found, whose profile images were all deep faked. So, how can we identify deep fakes - even before they go online? Advertising Inquiries: https://redcircle.com/brands

Jan 02, 202038 min

GAN and Deep Fakes, Part 1

Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and Trump deliver speeches they never gave, Gal Gadot "stars” in a porn video, and professional comedians such as Bill Hader eerily turn into the people they impersonate, like Tom Cruise and Arnold Schwarzenegger. What all of these videos have in common is that they were mostly created by amateur developers or small startups with tight budgets - but their quality is surprising...

Dec 19, 201943 min

Human Side Channels

Human Side Channels Advertising Inquiries: https://redcircle.com/brands

Dec 03, 201934 min

What's the problem with Cyber Insurance?

Thousands of companies are losing millions of dollars to cyber attacks. An insurance seems an ideal solution to their woes - yet this kind of insurance is much less common today, than it should be. What's the problem with Cyber insurance? Advertising Inquiries: https://redcircle.com/brands

Nov 21, 201936 min

Gozi B-Side: Amit Serper & Sam Curry

Nate Nelson speaks with Amit Serper & Sam Curry, notable veteran in Cyber Security, about Malware-As-A-Service, bullet-proof hosting, avoiding the lure of the 'dark side' and more. Advertising Inquiries: https://redcircle.com/brands

Nov 19, 201919 min

Gozi Part 2

In 2010, Nikita Kuzmin returned to the malware scene with Gozi 2.0, an improved version of the successful banking Trojan. How did Gozi 2.0 fair against Zeus & the new generation of Trojans, and what can we learn from Nikita's story about how one becomes a malicious hacker in the first place? Advertising Inquiries: https://redcircle.com/brands

Nov 14, 201935 min

EP61: Prying Eyes

Roughly 600,000 laptops are lost every year in US airports alone: some reports say a laptop is stolen every minute. How hard is it to hack into a stolen laptop? "Hackable?", McAfee's Cyber Security podcast, investigates. Check out their website: https://hackablepodcast.com/ . Advertising Inquiries: https://redcircle.com/brands

Nov 12, 201930 min

EP60: ML B-Side: Lodrian Cherne On Stalkerware

In this out-of-band episode, we're bringing you the full interview with Lodrina Cherne, a Digital Forensics Expert, on S pyware : what is it, how it works, who sells it, and how you can avoid it yourself. Advertising Inquiries: https://redcircle.com/brands

Nov 08, 201918 min

EP59: Gozi, Part 1: The Rise of Malware-as-a-Service

Nikita Kuzmin could have been a whiz programmer or a CEO of a successful startup. But as a teen in Moscow, he fell in with the wrong crowd, and his entrepreneurial skills found a different path: Gozi, the oddest and most brilliant malware operation ever conceived to that point in time. Advertising Inquiries: https://redcircle.com/brands

Oct 31, 201929 min

EP58: How is Spyware Legal?

Today's Cyber Stalkers have free access to almost government-grade spyware software with which they can terrorize their victims. Who's enabling the commercial spyware market? Advertising Inquiries: https://redcircle.com/brands

Oct 17, 201941 min

EP57: Listeners Survey Special

Ran and Eliad Kimhy, one of the show's top producers, discuss the recent Listener's Survey results: what do like and dislike about the show, ideas you gave us for future improvements - and what do our listeners think about Ran's accent?... Advertising Inquiries: https://redcircle.com/brands

Oct 10, 201929 min

EP56: Operation Aurora, Part 2

Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his own name - and wasn't happy with the search results?... Advertising Inquiries: https://redcircle.com/brands

Sep 26, 201933 min

EP55: Operation Aurora, Part 1

In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and often turbulent relationship between the world's largest internet company, and the world's most populated nation. Advertising Inquiries: https://redcircle.com/brands

Sep 12, 201934 min

Responding to a Cyber Attack with Missiles

Should governments responde to cyber attack with deadly force? Senior researcher Mikko Hypponen and Prof. Itzik Ben Israel (Ret. General, IDF R&D) discuss this sensative question. Advertising Inquiries: https://redcircle.com/brands

Aug 29, 201955 min

EP53: Are Ad Blockers Malicious?

Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by some blockers present us with a moral dilemma. Advertising Inquiries: https://redcircle.com/brands

Aug 15, 201933 min

ML_Conficker

Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure. Advertising Inquiries: https://redcircle.com/brands

Jul 18, 201940 min
For the best experience, listen in Metacast app for iOS or Android
Open in Metacast