meta_pixel
Tapesearch Logo
Log in
Malicious Life

Ghost In The Machine

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 28 June 2017

⏱️ 26 minutes

🧾️ Download transcript

Summary

Cybercrime is one of the most notable threats we face as computer users, nowadays. But it wasn’t always so. Those of us who’ve been in the field long enough may remember a time when computer viruses were much more innocent, and virus authors were usually just bored computer geeks- not members of a sophisticated, well-organized […] Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to Malicious Life brought to you by Cyber Reason.

0:17.0

My name is Ran Levin, podcaster software developer and author of several books on the history of technology.

0:27.0

The global accounting firm Price Waterhouse Coopers conducted a survey regarding financial crimes.

0:34.1

They found that cybercrime is the second most reported financial crime among its clients.

0:39.7

According to the FBI, more than $3 billion were either stolen or extorted from businesses or from individuals just in 2015.

0:49.0

Cybercrime is one of the most notable threats of the current age.

0:54.0

But it wasn't always like this.

1:04.0

The older ones among us may remember a different time

1:09.0

when computer viruses were much more innocent

1:12.0

and the virus authors were usually bored

1:15.0

computer geeks and not members of some sophisticated well-organized crime

1:20.0

syndicate. We are launching the Malicious Life Podcast

1:25.0

because we're fascinated by the world of cybercrime

1:28.0

and would like to share with you

1:30.0

the stories of how it evolved and became one of the biggest threats to today's society.

1:36.2

In the upcoming episodes, we'll track the changes that took place in the world of cybercrime.

1:42.3

We'll talk about the early hacker culture of the 1970s and 80s

1:46.0

and the subsequent rise of viruses in the 1990s.

1:50.0

Next, we'll discuss email spam

1:52.0

and how he transformed cybercrime from a small time

1:56.4

opportunistic crime to a bona fide business model. We'll talk about botnets,

2:01.8

D-D-D-D-D-D-D-Sattacts and activists, and finally about the latest and perhaps

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.