Malicious Life

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

https://malicious.life

Eine durchschnittliche Folge dieses Podcasts dauert 32m. Bisher sind 194 Folge(n) erschienen. Dies ist ein wöchentlich erscheinender Podcast.

Gesamtlänge aller Episoden: 4 days 10 hours 47 minutes

subscribe
share






recommended podcasts


“King Kimble”: Kim DotCom?


The US government says that Kim Schmitz, better know as Kim DotCom, is the leader of a file sharing crime ring. He sees himself as a an internet freedom fighter: a fugitive on the run from vindictive overly-powerful governments.


share








   32m
 
 

Hacking Multi-Factor Authentication [ML B-side]


Multi-Factor Authentication (MFA) is usually considered a better solution for authentication than just using passwords. But Roger Grimes, a veteran security professional, and a Data-Driven Defense Evangelist claims that the sense of security current MF...


share








   26m
 
 

Hacking Language Models


Language models are everywhere today: they run in the background of Google Translate and other translation tools; they help operate voice assistants like Alexa or Siri; and most interestingly, they are available via several experiential projects trying...


share








   27m
 
 

Software Bill of Materials (SBOM) [ML B-side]


In May 2021, Following the Solarwinds and the Colonial Pipeline attacks, the Biden administration published a presidential Executive Order mandating the use of SBOMs - Software Bill of Materials - in all government agencies.


share








   25m
 
 

Leo Kuvayev– The Czar of Spammers


Railway systems are a mess of old systems built on top of older systems, running ancient operating systems and exposing their most sensitive inner workings to commuters via WIFI. Why are railway systems so difficult to defend,


share








 2022-08-22  26m
 
 

“A CISO’s Nightmare”: Israel Baron on Railway Security [ML B-side]


Railway systems are a mess of old systems built on top of older systems, running ancient operating systems and exposing their most sensitive inner workings to commuters via WIFI. Why are railway systems so difficult to defend,


share








 2022-08-15  26m
 
 

“Designed by criminals, for criminals”: Operation Trojan Shield


The Anom was the holy grail of dark, illegal communication: a mobile phone that could send encrypted messages, and even included a secret Kill-Switch to foil attempts by law enforcement agents to get to its contents.


share








 2022-08-08  27m
 
 

Andrew Ginter: A 40-Year-Old Backdoor [ML B-Side]


Ken Thompson is a legendary computer scientist who also made a seminal contribution to computer security in 1983, when he described a nifty hack that could allow an attacker to plant an almost undetectable malicious code inside a C compiler.


share








 2022-08-01  29m
 
 

Silk Road: The Amazon of drugs, Part 2


Silk Road’s success did more than bring the site more sellers and buyers, it also brought it more attention from law enforcement agencies as well as malicious hackers and other shady characters. Some of these shady characters, it turns out,


share








 2022-07-25  33m
 
 

Kurtis Minder: Ransomware Negotiations [ML B-Side]


Your organization was hit by ransomware, and it is now time to reach out to the hackers and negotiate the terms of a deal that will bring back your data, and (hopefully) won’t leave the company’s coffers empty.


share








 2022-07-18  30m