4.8 • 1K Ratings
🗓️ 5 March 2020
⏱️ 30 minutes
🧾️ Download transcript
ToTok, Part 1: How to Convince Someone to Download Spyware
Click on a timestamp to play from that location
0:00.0 | Hi and welcome to malicious life in collaboration with Cyber Reason. I'm Ren Levy. Two months ago Jeff Besos was hacked when the Crown Prince of Saudi Arabia sent him a malware-laced what's up message. |
0:27.0 | And while reading this and pressing a specific link that was attached or video that was attached to this what's up message. A hidden process or like a code |
0:38.4 | execution has been done in this device which installed a remote Trojan or remote agent on Bizos iPhone X. |
0:49.0 | This is Roy Ackerman, VP of product incubation, at Cyberreason. |
0:54.0 | Now, since then, the report mentions that a lot of vast amount of megabytes and gigabytes |
0:59.4 | like poured out of this device, and they didn't conclude what exactly was collected but it was a lot of data, |
1:07.0 | personal data of Bezels including messages and pictures that was shared with his lover. |
1:14.0 | You probably heard of the Bezos Hack. |
1:17.0 | It's a great story, one of the world's most powerful leaders, |
1:21.0 | hacking one of the world's most powerful man. |
1:25.0 | To those of us in cyber security, the story rang differently. |
1:31.0 | An iPhone X, typically thought of as one of the world's most secure devices and |
1:36.4 | what-up, one of the world's most popular mainstream apps, were both compromised. |
1:42.4 | Mobile is no longer on the fringe of apps were both compromised. |
1:45.7 | Mobile is no longer on the fringe of cyber security. |
1:51.9 | Mobile hacking tools are now a basic tool, preliminary and basic tool in every Western Intel organization that we have there. |
1:59.0 | Mobile considered as the next generation endpoint, mobile considered as a great replacement for |
2:06.2 | you know just like installing a hidden mic on apartments. |
2:11.4 | Too little of the discourse around cybersecurity takes mobile threats into account, |
2:17.0 | and we here at Malicious Life are part of the problem. |
2:21.0 | We did about 60 episodes before getting to mobile malware in our episode on spyware. |
2:27.0 | That was too long wait. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.