Malicious Life

Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meets Hackable- and come dig into a history you never knew existed.

https://redcircle.com/shows/malicious-life

Eine durchschnittliche Folge dieses Podcasts dauert 32m. Bisher sind 419 Folge(n) erschienen. Dieser Podcast erscheint wöchentlich.

Gesamtlänge aller Episoden: 9 days 12 hours 53 minutes

subscribe
share






recommended podcasts


The Morris Worm Pt. 2


In an attempt to halt the Morris worm’s path of destruction, a systems administrator at Harvard shut down the university router through which Andy Sudduth’s message would be sent to the internet.  The post didn’t go through until after it was too late....


share








 May 16, 2018  22m
 
 

The Morris Worm Pt. 2


In an attempt to halt the Morris worm’s path of destruction, a systems administrator at Harvard shut down the university router through which Andy Sudduth’s message would be sent to the internet.  The post didn’t go through until after it was too late....


share








 May 16, 2018  22m
 
 

The Morris Worm Pt. 1


We’ve introduced you to some of the seminal malware attacks that have shaped cybersecurity history. Perhaps no other incident in history, though, has had the effect on how we think about computer security today as the Morris worm.


share








 May 2, 2018  26m
 
 

The Half Life 2 Hack


How far should a die-hard fan go, in order to bring closer to them the thing that they love? In one of the most interesting, yet relatively unknown cybersecurity stories, a young hacker attempts to steal his favorite game prior to its release and then ...


share








 April 18, 2018  38m
 
 

The Legalities of the Cyber War


Catching a criminal is by no means easy, but there’s something we take for granted in any crime: that the criminal has a face and a name, that they used a specific weapon on a specific target, and that the crime had ended once it was complete.


share








 April 4, 2018  22m
 
 

episode 22: The Legalities of the Cyber War


Catching a criminal is by no means easy, but there’s something we take for granted in any crime: that the criminal has a face and a name, that they used a specific weapon on a specific target, and that the crime had ended once it was complete.   -


share








 April 4, 2018  22m
 
 

episode 21: Fancy Bear, Cozy Bear


When representatives from the Democratic National Committee reached out to a silicon valley cybersecurity company, to investigate a potential breach in their computer system, it’s hard to imagine what they might have expected to come of it. -


share








 March 21, 2018  30m
 
 

Fancy Bear, Cozy Bear


When representatives from the Democratic National Committee reached out to a silicon valley cybersecurity company, to investigate a potential breach in their computer system, it’s hard to imagine what they might have expected to come of it.


share








 March 21, 2018  30m
 
 

Episode 19: Hack Back


Those who have experienced a cybercrime  know the feelings of frustration and helplessness that come along with it. A hacker could be halfway across the world when they attack you, and you might have no way of figuring out who it was or catching them e...


share








 March 8, 2018  33m
 
 

Hack Back


Those who have experienced a cybercrime know the feelings of frustration and helplessness that come along with it. A hacker could be halfway across the world when they attack you, and you might have no way of figuring out who it was or catching them ev...


share








 March 7, 2018  33m