![ZDNet Security Update artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts113/v4/f0/08/4c/f0084cb5-5e14-4e00-9149-63cc21ec7074/mza_12464211536548031579.jpg/100x100bb.jpg)
How the cyber criminal underground works and what drives malicious hackers
ZDNet Security Update
English - April 10, 2020 04:00 - 11 minutesTechnology News Tech News Homepage Download Google Podcasts Overcast Castro Pocket Casts RSS feed
Danny Palmer talks to Liv Rowley, threat intelligence analyst at Blueliv about the underground economy and how those involved operate.
FOLLOW US
- Subscribe to ZDNet on YouTube: http://bit.ly/2HzQmyf
- Watch more ZDNet videos: http://zd.net/2Hzw9Zy
- Follow ZDNet on Twitter: https://twitter.com/ZDNet
- Follow ZDNet on Facebook: https://www.facebook.com/ZDNet
- Follow ZDNet on Instagram: https://www.instagram.com/ZDNet_CBSi
- Follow ZDNet on LinkedIn: https://www.linkedin.com/company/zdnet-com/
- Follow ZDNet on Snapchat: https://www.snapchat.com/add/zdnet_cbsi
Learn more about your ad choices. Visit megaphone.fm/adchoices
Danny Palmer talks to Liv Rowley, threat intelligence analyst at Blueliv about the underground economy and how those involved operate.
FOLLOW US
- Subscribe to ZDNet on YouTube: http://bit.ly/2HzQmyf
- Watch more ZDNet videos: http://zd.net/2Hzw9Zy
- Follow ZDNet on Twitter: https://twitter.com/ZDNet
- Follow ZDNet on Facebook: https://www.facebook.com/ZDNet
- Follow ZDNet on Instagram: https://www.instagram.com/ZDNet_CBSi
- Follow ZDNet on LinkedIn: https://www.linkedin.com/company/zdnet-com/
- Follow ZDNet on Snapchat: https://www.snapchat.com/add/zdnet_cbsi
Learn more about your ad choices. Visit megaphone.fm/adchoices