By Malicious Life
To listen to an audio podcast, mouse over the title and click Play. Open iTunes to download and subscribe to podcasts.
Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meets Hackable- and come dig into a history you never knew existed.
||CleanThe Melissa Virus||Not all malware is created equal. Some malware will attempt to erase your files, demand ransom, or steal your information. Others will do no such thing- and still end up being worse. Don’t believe us? What if a virus made your computer send pornograph||6/14/2018||Free||View in iTunes|
||CleanGhostNet||A young woman is arrested by the Chinese government while trying to cross the border to Tibet. Her interrogator, a Chinese spy, pulls out a dossier full of information regarding her activity online. It turns out she’s been visiting pro-Tibet websites,||5/29/2018||Free||View in iTunes|
||CleanThe Morris Worm Pt. 2||In an attempt to halt the Morris worm’s path of destruction, a systems administrator at Harvard shut down the university router through which Andy Sudduth’s message would be sent to the internet. The post didn’t go through until after it was too||5/15/2018||Free||View in iTunes|
||CleanThe Morris Worm Pt. 1||We’ve introduced you to some of the seminal malware attacks that have shaped cybersecurity history. Perhaps no other incident in history, though, has had the effect on how we think about computer security today as the Morris worm.||5/2/2018||Free||View in iTunes|
||CleanThe Half Life 2 Hack||How far should a die-hard fan go, in order to bring closer to them the thing that they love? In one of the most interesting, yet relatively unknown cybersecurity stories, a young hacker attempts to steal his favorite game prior to its release and then .||4/18/2018||Free||View in iTunes|
||CleanThe Legalities of the Cyber War||Catching a criminal is by no means easy, but there’s something we take for granted in any crime: that the criminal has a face and a name, that they used a specific weapon on a specific target, and that the crime had ended once it was complete.||4/3/2018||Free||View in iTunes|
||CleanFancy Bear, Cozy Bear||When representatives from the Democratic National Committee reached out to a silicon valley cybersecurity company, to investigate a potential breach in their computer system, it’s hard to imagine what they might have expected to come of it.||3/20/2018||Free||View in iTunes|
||CleanHack Back||Those who have experienced a cybercrime know the feelings of frustration and helplessness that come along with it. A hacker could be halfway across the world when they attack you, and you might have no way of figuring out who it was or catching them e||3/6/2018||Free||View in iTunes|
||CleanCyber Terrorism||What governments and powerful organizations regularly use, others will find ways to use as well. Cyber activity fits so incredibly well with terrorism. Actors can remain hidden, or reveal themselves to the world; Create propaganda campaign,||2/21/2018||Free||View in iTunes|
||CleanSuper Spies||The NSA has many means at its disposal. But how does it use these means, and for what goals? Discover the (literally) secret history of the NSA’s cyber activity. Travel with us to Russia and back, learn the origins of FISA,||2/7/2018||Free||View in iTunes|
||CleanThe Trojan Horse Affair||The early 2000s were an interesting time in Information Security. This is roughly the period when malware transitioned from viruses written by teenagers for fun, to cybercrime tools in the hands of sophisticated criminals.||1/23/2018||Free||View in iTunes|
||CleanFriend or Foe||The largest hack in U.S military history may have been conducted by… The NSA. In 1997, a wargame conducted by the NSA showed just how unprepared we were for a potential cybernetic strike- in 4 days, NSA hackers were able to take down entire military||1/9/2018||Free||View in iTunes|
||CleanAmit Serper Interview- Holiday Special Episode||It’s the holidays and everyone’s on vacation – but the Internet never rests and neither do the bad guys in cybersecurity. So, for this holiday special, we figured we’ll air an interesting interview we did a few weeks back with Amit Serper,||12/26/2017||Free||View in iTunes|
||CleanDeception||From the Bulgarian hacker scene of the 90’s, featured in episodes 1 and 2, we now move to the vibrant underground hacker scene of West and East Berlin. Working secretly for the KGB, a young Berliner hacker attempts to hack the U.S military network,||12/12/2017||Free||View in iTunes|
||CleanWeapons of Mass Disruption||The threat of fire and fury stands at the center of all modern conflicts- nuclear bombs that can eradicate life in seconds are the ultimate weapon of war, as they pose a huge threat to centers of population. But what of the cyber war?||11/29/2017||Free||View in iTunes|
||CleanThe Soldiers of North Korea||Guerrilla warfare has been around for as long as conventional warfare has. The idea that a small force, through cunning and brazen action, could overtake a larger force is an old one. From pirates who would take merchant ships by surprise,||11/14/2017||Free||View in iTunes|
||CleanThe Propaganda||Governments around the world have been making devious use of the internet as a platform to spread, not malware, but propaganda. As in all wars, propaganda is a huge part of the modern cyber war. Join us as we explore the roots,||10/31/2017||Free||View in iTunes|
||CleanThe Whistleblowers||WikiLeaks has ushered in a new age in whistle blowing: Modern leakers such as Chelsea Manning – who’s story is the focus of our current episode – expose huge amounts of confidential information. But can these mega-leaks really influence the action||10/16/2017||Free||View in iTunes|
||CleanStuxnet, part 3||Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of the modern cyber war,||10/1/2017||Free||View in iTunes|
||CleanStuxnet, part 2||Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way to its destination. An invisible commando unit,||9/17/2017||Free||View in iTunes|
||CleanStuxnet, part 1||Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever. Dubbed Stuxnet,||8/30/2017||Free||View in iTunes|
||CleanHell to Pay||A global FBI manhunt for the world’s most wanted cyber criminal ends in the capture of a massive criminal network, but with the escape of the man himself. Security experts who operate within the gray areas of morality develop botnets that destroy pers||8/21/2017||Free||View in iTunes|
||CleanThe Roots of Evil||WannaCry’s widespread cyber attack on more than 200,000 computers all over the world made headlines – but only a few people remember a similar attack, named The AIDS Trojan, almost 30 years earlier… In this episode of Malicious Life,||8/7/2017||Free||View in iTunes|
||CleanBig Cannons||2016 is known throughout the circles of information security as “The Year of The DDoS Attacks”, and rightfully so: 5 large scale DDoS attacks – ‘Distributed Denial Of Service’ – shocked the technology world. In this episode of Malicious Life||7/24/2017||Free||View in iTunes|
||CleanSpam Empire||In this episode of Malicious Life, we take a look at one of the oldest forms of shady dealings on the web- spam mail.||7/6/2017||Free||View in iTunes|
||CleanThe Dark Avenger||In 1989, a message was found in a virus: “Eddie Lives…Somewhere in Time!”. ‘Eddie’ was a particularly nasty virus, and its discovery led a young Bulgarian security researcher down a rabbit hole, on a hunt for the prolific creator of the Eddie||6/29/2017||Free||View in iTunes|
||CleanGhost In The Machine||Cybercrime is one of the most notable threats we face as computer users, nowadays. But it wasn’t always so. Those of us who’ve been in the field long enough may remember a time when computer viruses were much more innocent,||6/28/2017||Free||View in iTunes|
Hot topic, brilliant concept.
Can't wait to hear more of this!!
Deep dive into hacking and tech!
Very interesting to hear the details behind various viruses, hacks and more. Well produced and good content.
I was surprised when my friend pointed me to this podcast because I'm not a techie, but it was so interesting. Had no idea this goes so far back in history!