24 episodes

A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities.

Produced by PI Media LTD

CPradio PI Media

    • Technology
    • 4.8 • 26 Ratings

A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities.

Produced by PI Media LTD

    Cyber Academy - What is the difference between Viruses, Worms and Trojans? [CPRadio]

    Cyber Academy - What is the difference between Viruses, Worms and Trojans? [CPRadio]

    In this episode of "Cyber Academy" we will talk about viruses, worms and trojans. What is the difference between these three types of malware and what they have in common. We will talk about their evolvement since the early days of the internet till today. How in the past there was a clear distinction between them and today classifying them is a bit more complicated.

    • 14 min
    [CPRadio] The State of Ransomware

    [CPRadio] The State of Ransomware

    Last May, in one of the most brazen attacks ever attempted, cybercriminals from Eastern Europe shut down the supply of gasoline to most of the east coast of the United States. Past the many millions of people affected, and the many millions of dollars lost, it was a message: that ransomware can have world-altering consequences.

    It wasn't that long ago that ransomware didn't even exist. How did we get to this point? And is there any way to stop this most popular trend in cybercrime, before it's too late?

    • 25 min
    [CPRadio] Cyber Academy – Botnets

    [CPRadio] Cyber Academy – Botnets

    In this episode of “Cyber Academy, we will talk about Botnets. What are Botnets used for? How does the Botmaster, the attacker, control the bots he has under his control? We will talk about the different aspects of this modern-day crime. For example how it's connected to spam mail or bitcoins. Are Botnets an ingenious way to make "easy money" or do Botmasters have to work hard just like everybody else…About the creative "mouse and cat" game played against Botmasters and a lot more in the second episode of Cyber Acadamy.

    • 14 min
    [CPRadio] Your Most Vulnerable Computer

    [CPRadio] Your Most Vulnerable Computer

    Would you use a computer without any kind of antivirus? Would you put your personal photos on that device? Use it to text and email? Access your bank? It turns out: you're probably already doing all of these things. The most sensitive, least protected device in your life is in your pocket right now.

    • 22 min
    [CPRadio] Cyber Academy - Vulnerabilities

    [CPRadio] Cyber Academy - Vulnerabilities

    In our previous episodes, you heard the term "vulnerabilities" more than once. But what exactly does it mean? What stands behind this big word?
    For such terms and questions, we create the format of "Cyber Academy''. In each "Cyber Academy' episode, we’ll bring you a single topic - usually a basic term, an idea or a technology related to cybersecurity - and cover the basics of what you need to know about that topic, in order to better understand cybersecurity and its complexities. 
    So, enough with the introductions - let’s dive straight into our first topic: Vulnerabilities.

    • 20 min
    [CPRadio] 2020 in Cybersecurity

    [CPRadio] 2020 in Cybersecurity

    In 2020 hospitals were hit with ransomware, corporations with phishing attacks, and we saw one of the biggest hacks ever conceived: the SolarWinds breach. It was a groundbreaking year, so in this episode we're summarizing the most important things you need to know. A SparkNotes for cybersecurity in 2020.

    • 25 min

Customer Reviews

4.8 out of 5
26 Ratings

26 Ratings

Top Podcasts In Technology

Listeners Also Subscribed To