Malicious Life

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

https://malicious.life

Eine durchschnittliche Folge dieses Podcasts dauert 34m. Bisher sind 119 Folge(n) erschienen. Dies ist ein zweiwöchentlich erscheinender Podcast.

Gesamtlänge aller Episoden: 2 days 21 hours 18 minutes

subscribe
share





recommended podcasts


Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side]


Chris Wysopal, a cyber security pionneer and one of L0pht's founding members, talks about the group's 1998 testimony in the Senate, how they used shaming to force cooporations to fix their software, and the (not so fortunate) consequenses of the sale t...


share







   40m
 
 

‘L0pht’, Part 2 – The End


In the early days, the L0pht guys tinkered with what they already had laying around, or could find dumpster diving. But things change, of course. By the end of the ‘90s many of the L0pht hackers had quit their day jobs,


share







   44m
 
 

The Story of ‘L0pht’, Part 1


'L0pht', or 'L0pht Heavy Indutries', was one of the most infuencial hacker collectives of the 90's: it's members were even invited to testify infront of the Congress on the current state of Internet security. In this episode,


share







   38m
 
 

The MS Exchange Hack [ML B-Side]


Israel Barack, Cybereason's CISO and an expert on cyber-warfare, on the recent MS Exchange hack that hit thousands of organizations worldwide: what happened, what were the vulenrabilites expolited in the attack - and what can we do to defend against s...


share







   24m
 
 

NotPetya, Part 2


When the NotPetya pandemic hit, Cyber Analyst Amit Serper was sitting in his parents' living room, getting ready to go out with a few friends. He didn't have most of his tools with him, but he nonetheless took a swipe at the malware. An hour later,


share







 2021-03-15  26m
 
 

NotPetya, Part 1


On June 28th, 2017, millions of Ukranians were celebrating 'Constitution Day.' Their national holiday turned into a nightmare, as tens of thousands of computers all over the country were infected by a mysterious malware. By that afternoon,


share







 2021-03-01  32m
 
 

Facial Recognition in Law Enforcement, Pt. 2


It seems likely that legislation alone won't be able to regulate the widespread use of facial recognition. Andrew Maximov, who uses AI to fight Belarus's dictatorship, shows us another way facical recognition can be used - this time for us,


share







 2021-02-16  32m
 
 

Should Law Enforcement Use Facial Recognition? Pt. 1


There are plenty of reasons why Police should use AI for facial recognition: after all, Humans are notoriously bad eye witnesses. However, placing AI in the hands of law enforcement does have its dangers - due to the limitations of the technology itsel...


share







 2021-02-03  48m
 
 

Clearview AI


Clearview AI scrapes billions of images off social media and the open web, applies facial recognition algorithms on them - and sells that data to law enforcement agencies all over the world. But who are the people behind this secretive company,


share







 2021-01-21  44m
 
 

Breaking Into Secure Buildings


FC, aka 'Freaky Clown', is an expert in "Physical assessments" - otherwise known as breaking into ultra-secure office buildings. FC shares some of his (incredible) adventures, as well as some tips and tricks on how to protect your organization's HQ fro...


share







 2021-01-07  35m