Malicious Life

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

https://malicious.life

Eine durchschnittliche Folge dieses Podcasts dauert 33m. Bisher sind 96 Folge(n) erschienen. Dieser Podcast erscheint jede zweite Woche
subscribe
share





recommended podcasts


From Ransomware To Blackmail, With Assaf Dahan


Hackers keep modifying and improving their methods of operations. Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason, tells us about the recent shift to Blackmail - as a way to pressure Ransomware victims to pay the ransom.


share







   14m
 
 

SegWit2x, Part 3


On August 1st, 2017, Bitcoin forked. But it wasn't the SegWit2x fork everyone was talking about - It was a different fork, supported by a coalition of miners who, in doing what they were doing, were essentially ditching SegWit2x in favor of their own s...


share







   59m
 
 

SegWit2x, Part 2


SegWit2x was proposed as a solution to Bitcoin's network problems - but some people in the anti-2x movement claimed that it is nothing less than a cyber-attack: a 51% attack on Bitcoin, to be precise. This is getting ugly.


share







   49m
 
 

Hacking Fortnite Accounts (CPRadio)


A black market economy has developed around Fortnite's in-game currency. Cyber criminals are hacking user accounts, juicing credit cards, and selling virtual currency for real-life dollars and cents. To ensure fun and safety for players,


share







 2020-06-11  29m
 
 

SegWit2x, or – The Year Bitcoiners Will Never Forget, Part 1


In 2017, Bitcoin was winning. Money, attention, success poured out of every seam. It appeared that a golden age had dawned. But just under the surface, the network was teetering on the verge of collapse. Technical problems that were just nuisances when...


share







 2020-06-04  36m
 
 

No Honor Among Thieves


Amit Serper was doing a routine inspection on a client's network, when he came across a suspicious-looking pen-testing tool, exhibiting RAT-like behavior. We'll follow Amit's investigation, and in the process learn the basics of cyber research.


share







 2020-05-22  40m
 
 

Cybersecurity during a crisis: how remote work has impacted security – With Sam Curry


The COVID19 pandemic forced organizations to transition to a work-from-home model - and many of them were unprepared for such a radical departure from the ‘normal’ security perimeter. Sam Curry, Cybereason's CSO,


share







 2020-05-14  15m
 
 

The Problem With Passwords


At the end of our last episode, it kind of seemed like Huawei--the Chinese telecommunications company accused of aiding in state cyberspying--was completely innocent. They were being accused of crimes they may not have committed,


share







 2020-05-08  44m
 
 

The Huawei Ban, Part 2


At the end of our last episode, it kind of seemed like Huawei--the Chinese telecommunications company accused of aiding in state cyberspying--was completely innocent. They were being accused of crimes they may not have committed,


share







 2020-04-23  37m
 
 

The Huawei Ban, Part 1


Over the past 20 years, western governments have accused Huawei of everything from IP theft to financial fraud to cyber spying. Often, these claims are made either with no evidence, or only circumstantial evidence.


share







 2020-04-09  30m