Malicious Life

Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meets Hackable- and come dig into a history you never knew existed.

https://redcircle.com/shows/malicious-life

Eine durchschnittliche Folge dieses Podcasts dauert 32m. Bisher sind 418 Folge(n) erschienen. Jede Woche gibt es eine neue Folge dieses Podcasts.

Gesamtlänge aller Episoden: 9 days 12 hours 6 minutes

subscribe
share






recommended podcasts


Hacking Stock Markets, Part 1


In any trading market, at any time in history, no matter where you are, the most important thing you can possess isn’t actually money, or influence, or anything like that. Knowledge -- in particular, knowing something before everybody else -- is far mo...


share








 October 4, 2022  29m
 
 

Hacking Stock Markets, Part 1


Hacking Stock Markets, Part 1



Advertising Inquiries: https://redcircle.com/brands


share








 October 4, 2022  29m
 
 

What it’s Like to Fight LulzSec [ML B-Side]


The name Lulzsec is probably very familiar to listeners who were around in 2011, when this hacking group was at the peak of its nefarious activity. As their name implies, Lulzsec was known for trolling their victims: their childish behavior might have ...


share








 September 27, 2022  24m
 
 

What’s it's Like to Fight LulzSec [ML B-Side]


What’s it's Like to Fight LulzSec [ML B-Side]



Advertising Inquiries: https://redcircle.com/brands


share








 September 27, 2022  24m
 
 

“King Kimble”: Kim DotCom?


The US government says that Kim Schmitz, better know as Kim DotCom, is the leader of a file sharing crime ring. He sees himself as a an internet freedom fighter: a fugitive on the run from vindictive overly-powerful governments.


share








 September 19, 2022  32m
 
 

"King Kimble": Kim DotCom


The US government says that Kim Schmitz, better know as Kim DotCom, is the leader of a file sharing crime ring. He sees himself as a an internet freedom fighter: a fugitive on the run from vindictive overly-powerful governments. Can King Kimble escape the wrath of the USA?



Advertising Inquiries: https://redcircle.com/brands


share








 September 18, 2022  32m
 
 

Hacking Multi-Factor Authentication [ML B-side]


Multi-Factor Authentication (MFA) is usually considered a better solution for authentication than just using passwords. But Roger Grimes, a veteran security professional, and a Data-Driven Defense Evangelist claims that the sense of security current MF...


share








 September 13, 2022  26m
 
 

Hacking Multi-Factor Authentication


Multi-Factor Authentication (MFA) is usually considered a better solution for authentication than just using passwords. But Roger Grimes, a veteran security professional, and a Data-Driven Defense Evangelist claims that the sense of security current MFA solutions provides us - is false. 



Advertising Inquiries: https://redcircle.com/brands


share








 September 13, 2022  26m
 
 

Hacking Language Models


Language models are everywhere today: they run in the background of Google Translate and other translation tools; they help operate voice assistants like Alexa or Siri; and most interestingly, they are available via several experiential projects trying...


share








 September 5, 2022  27m
 
 

Hacking Language Models


Language models are everywhere today: they run in the background of Google Translate and other translation tools; they help operate voice assistants like Alexa or Siri; and most interestingly, they are available via several experiential projects trying to emulate natural conversations, such as OpenAI’s GPT-3 and Google’s LaMDA. Can these models be hacked to gain access to the sensitive information they learned from their training data? 



Advertising Inquiries: https://redcircle...


share








 September 5, 2022  27m