Malicious Life

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

https://malicious.life

Eine durchschnittliche Folge dieses Podcasts dauert 34m. Bisher sind 111 Folge(n) erschienen. Dies ist ein zweiwöchentlich erscheinender Podcast.

Gesamtlänge aller Episoden: 2 days 16 hours 30 minutes

subscribe
share





recommended podcasts


Clearview AI


Clearview AI scrapes billions of images off social media and the open web, applies facial recognition algorithms on them - and sells that data to law enforcement agencies all over the world. But who are the people behind this secretive company,


share







   44m
 
 

Breaking Into Secure Buildings


FC, aka 'Freaky Clown', is an expert in "Physical assessments" - otherwise known as breaking into ultra-secure office buildings. FC shares some of his (incredible) adventures, as well as some tips and tricks on how to protect your organization's HQ fro...


share







   35m
 
 

Special: The SolarWinds Hack


Ran talks to Israel Barak, Cybereason's CISO and a Cyber-defense and Warfare expert, about the recent SolarWinds hack that impacted upto 18,000(!) enterprise organizations in the US. What is a Supply Chain Attack,


share







   34m
 
 

100th Episode Special


For our 100th episode, we bring you three stories that tie in to previous episodes of the show: Shadow Inc. (Election Hacking), J&K (Max Headroom) and T-Shirt-Gate (Yahoo's Ugly Death). Enjoy :-)


share







 2020-12-21  41m
 
 

Jan Sloot’s Incredible Data Compression System


In the mid-90's, a Dutch TV repairman claimed he invented a revolutionary data compression technology that could compress a full-length movie into just 8KB.


share







 2020-12-07  54m
 
 

Op. GUNMAN & The World’s First Keylogger


Georgia's elections infrastructure had been hacked multiple times since 2014 - both by Russian Intelligence and local White Hat hackers. The upcoming elections are plagued with uncertainty - and uncertainty and democracy go together like wet hands and ...


share







 2020-11-22  41m
 
 

Election Hacking, Part 2


According to estimates, more than twice as many people will vote by mail in this year’s U.S. presidential election than they did in 2016. Some key swing states, like Pennsylvania and Wisconsin, don’t start counting mail-in ballots until Election Day.


share







 2020-11-03  42m
 
 

Election Hacking, Part 1


Today we’re talking about just one state. One which, depending on which way it leans, might bring the entire electoral college with it. One which, as of this writing, is absolutely, positively, neck and neck. Dead heat.


share







 2020-10-22  36m
 
 

MDR Vs. The TrickBot Gang


About a year ago, Cybereason's Managed Detection and Response team (aka MDR) stumbled upon a attack involving Russian cybercriminals, POS devices and an entire new family of previously undiscovered malware.


share







 2020-10-12  24m
 
 

Yahoo’s Ugly Death, Part 2


Between 2010 and 2014, Yahoo was hacked numerous times - each time setting a new 'world record' for the largest data breach in history. It also hid those breaches from it's investors, customers and the SEC.


share







 2020-09-25  43m