72 episodes

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

Malicious Life Malicious Life

    • Technology

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

    How To Defend A Bank, Part 1: Fusion Centers

    How To Defend A Bank, Part 1: Fusion Centers

    Banks & other financial institutions face a variety of security threats: from state-sponsored cyber-attacks, to smaller acts of fraud, to thousands of random malware attacks from the web. To survive in this hostile landscape, these organizations turned to the military for inspiration.

    • 27 min
    Triton, Part 2: The World’s Most Dangerous Malware

    Triton, Part 2: The World’s Most Dangerous Malware

    Petro Rabigh were facing lots of problems in defending their systems. But they did get lucky in one sense: their hackers were unprepared when their plan went awry. Who were the hackers that infiltrated the Saudi petrochemical plant, and what can this breach teach us?

    • 38 min
    Triton: A Malware Designed To Kill Humans, Part 1

    Triton: A Malware Designed To Kill Humans, Part 1

    Industrial Security requires a different skill set--really, an entirely different mindset than working in IT does. In this episode we dive into the story of one of the most dangerous malware ever to be discovered in the wild: Triton/Trisis.

    • 36 min
    Deep Fakes, Part 2: Man Vs. Machine

    Deep Fakes, Part 2: Man Vs. Machine

    Deep Fakes are set to revolutionize content creation, but alongside this technology's benefits, it also has the potential two sow havoc, fear, and distrust via Social Networks. Just this week, Facebook disclosed a network of fake users it found, whose profile images were all deep faked. So, how can we identify deep fakes - even before they go online?

    • 37 min
    GAN and Deep Fakes, Part 1

    GAN and Deep Fakes, Part 1

    Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and Trump deliver speeches they never gave, Gal Gadot "stars” in a porn video, and professional comedians such as Bill Hader eerily turn into the people they impersonate, like Tom Cruise and Arnold Schwarzenegger.



    What all of these videos have in common is that they were mostly created by amateur developers or small startups with tight budgets - but their quality is surprisingly good, and in some cases as good as what the biggest movie studios were able to produce with huge budgets just a few years ago.







    So what happened in the last five years, that turned special effects from being the exclusive domain of industry experts - into something a 14-year-old can create more or less at the touch of a button? Like the top end of a floating glacier, Deep Fakes are by and large only the visible product of a fascinating - and much deeper - technological revolution in the field of artificial intelligence. As we shall soon see, this revolution has the potential to put some very powerful tools in the hands of both attackers and defenders in the world of cyber-security.

    • 43 min
    Sam Curry: The 2020 Crystal Ball

    Sam Curry: The 2020 Crystal Ball

    Sam Curry is Cybereason's Chief Security Officer and an award-winning cyber security visionary. Sam & Ran discuss Sam's upcoming webinar, in which he will present his insights into what 2020 will bring for the security industry: the rise of 5G cellular networks, The US Presidential Elections, the 2020 Tokyo Olympics and more.

    • 15 min

Customer Reviews

Swainjoel ,

Malicious life

I love how well constructed each of these podcasts are. Explaining very complex topics in such an amazing ways.

TNSEB ,

Bingeing

Been fiendish this pod hard! Amazing stuff.

Damiano Fanto ,

Compelling Listening!

This is a brilliantly produced, well researched and infinitely interesting podcast! Can’t get enough of this!

Top Podcasts In Technology

Listeners Also Subscribed To