Powered by RND
Écoutez Malicious Life dans l'application
Écoutez Malicious Life dans l'application
(48 139)(250 169)
Sauvegarde des favoris
Réveil
Minuteur
Sauvegarde des favoris
Réveil
Minuteur

Malicious Life

Podcast Malicious Life
Podcast Malicious Life

Malicious Life

Malicious Life
ajouter
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journal...
Voir plus
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journal...
Voir plus

Épisodes disponibles

5 sur 231
  • Operation Kudo
    In 1981, during the G7 Summit in Quebec, French president Francois Mitterand handen President Raegan a top secret collection of documents, called "Farewell Dossier." The information found in the dossier allowed the US to devise a cunning plan - the very first supply chain attack, if you will - to bring a firey end to one of largest industrial espionage campaigns in history. Advertising Inquiries: https://redcircle.com/brands
    20/09/2023
    33:33
  • Can We Stop the AI Cyber Threat?
    Much of the cybersecurity software in use today utilizes AI, especially things like spam filters and network traffic monitors. But will all those tools be enough to stop the proliferation of malware that will come from generative AI-driven cyber attacks? The potential of AI to disrupt cyberspace is far greater than any solutions we’ve come up with thus far, which is why some researchers are looking beyond the traditional answers, towards more aggressive measures.Advertising Inquiries: https://redcircle.com/brands
    04/09/2023
    27:07
  • Is Generative AI Dangerous?
    Every so often, the entire landscape of cybersecurity shifts, all at once: The latest seismic shift in the field occurred just last year. So in this episode of Malicious Life we’re going to take a look into the future of cybersecurity: at how generative AI like ChatGPT will change cyberspace, through the eyes of five research teams breaking ground in the field. We’ll start off simple, and gradually build to increasingly more complex, more futuristic examples of how this technology might well turn against us, forcing us to solve problems we’d never considered before.Advertising Inquiries: https://redcircle.com/brands
    22/08/2023
    37:58
  • Why aren't there more bug bounty programs?
    On the face of it, there's an obvious economic incentive for both vendors and security researchers to collaborate on disclosing vulnerabilities safely and privately. Yet bug bounty programs have gained prominence only in the past decade or so, and even today only a relatively small portion of vendors have such programs at place. Why is that? Advertising Inquiries: https://redcircle.com/brands
    08/08/2023
    33:54
  • The Voynich Manuscript
    The constant battle between those who wish to encrypt data and those who wish to break these ciphers has made modern encryption schemes extremely powerful. Subsequently, the tools and methods to break them became equivalently sophisticated. Yet, could it be that someone in the 15th century created a cipher that even today’s most brilliant codebreakers and most sophisticated and advanced tools - cannot break?...Advertising Inquiries: https://redcircle.com/brands
    25/07/2023
    29:04

Plus de podcasts Technologies

À propos de Malicious Life

Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Site web du podcast

Écoutez Malicious Life, Apple, différemment ou d'autres radios du monde entier - avec l'app de radio.fr

Malicious Life

Malicious Life

Téléchargez gratuitement et écoutez facilement la radio.

Google Play StoreApp Store