Malicious Life

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

https://malicious.life

Eine durchschnittliche Folge dieses Podcasts dauert 33m. Bisher sind 102 Folge(n) erschienen. Alle zwei Wochen gibt es eine neue Folge dieses Podcasts
subscribe
share





recommended podcasts


Yahoo’s Ugly Death, Part 2


Between 2010 and 2014, Yahoo was hacked numerous times - each time setting a new 'world record' for the largest data breach in history. It also hid those breaches from it's investors, customers and the SEC.


share







   43m
 
 

Yahoo’s Ugly Death, Part 1


When Marissa Mayer joined Yahoo as CEO, the company's stock rose 2% the day of the announcement. But the new CEO was basically initiated into her job by a major data breath - and the worst was yet to come.


share







   33m
 
 

The Great Firewall of China, Pt. 2: Cisco’s Trial


Falun Gong is a religious movement heavily persecuted in China. In 2017, members of the movement sued Cisco Systems for aiding and abetting the Chinese government in this persecution - since Cisco helped China erect 'Golden Shield'": the massive Chines...


share







 2020-08-27  28m
 
 

The Great Firewall of China – Part 1


The Great Firewall is just mind-bogglingly big, repressing freedom of speech and information for over 800 million Chinese internet users every year. The Great Firewall is so big that it’s worth asking: how did the Chinese manage to build it in the firs...


share







 2020-08-14  40m
 
 

Multi-Stage Ransomware (Live!)


Ran & Israel Barak, Cybereason's CISO, discuss the latest development in ransomware evolution: multi-stage attacks in which the attackers infiltrate the target network, steal data and gather intelligence - before detonating the ransomware to cause maxi...


share







 2020-08-02  47m
 
 

Protecting The “Panama Papers” Whistleblower


In 2015 Bastian Obermayer, an investigative journalist for the Süddeutsche Zeitung, received a message every journalist dreams of: the biggest leak in journalism history. But dealing with the massive 2.7 Terabyte data-dump, 11.


share







 2020-07-16  14m
 
 

From Ransomware To Blackmail, With Assaf Dahan


Hackers keep modifying and improving their methods of operations. Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason, tells us about the recent shift to Blackmail - as a way to pressure Ransomware victims to pay the ransom.


share







 2020-07-07  14m
 
 

SegWit2x, Part 3


On August 1st, 2017, Bitcoin forked. But it wasn't the SegWit2x fork everyone was talking about - It was a different fork, supported by a coalition of miners who, in doing what they were doing, were essentially ditching SegWit2x in favor of their own s...


share







 2020-07-03  59m
 
 

SegWit2x, Part 2


SegWit2x was proposed as a solution to Bitcoin's network problems - but some people in the anti-2x movement claimed that it is nothing less than a cyber-attack: a 51% attack on Bitcoin, to be precise. This is getting ugly.


share







 2020-06-19  49m
 
 

Hacking Fortnite Accounts (CPRadio)


A black market economy has developed around Fortnite's in-game currency. Cyber criminals are hacking user accounts, juicing credit cards, and selling virtual currency for real-life dollars and cents. To ensure fun and safety for players,


share







 2020-06-11  29m