74 épisodes

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

Malicious Life Malicious Life

    • Technologies

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

    Triton: A Malware Designed To Kill Humans, Part 1

    Triton: A Malware Designed To Kill Humans, Part 1

    Industrial Security requires a different skill set--really, an entirely different mindset than working in IT does. In this episode we dive into the story of one of the most dangerous malware ever to be discovered in the wild: Triton/Trisis.

    • 36 min
    Dead Drops

    Dead Drops

    You spot a dropped USB drive laying on the ground or in your office. Did someone lose their files or is it a trap set by a hacker? An episode of "Hackable?", McAfee's Cyber Security podcast.

    • 38 min
    Deep Fakes, Part 2: Man Vs. Machine

    Deep Fakes, Part 2: Man Vs. Machine

    Deep Fakes are set to revolutionize content creation, but alongside this technology's benefits, it also has the potential two sow havoc, fear, and distrust via Social Networks. Just this week, Facebook disclosed a network of fake users it found, whose profile images were all deep faked. So, how can we identify deep fakes - even before they go online?

    • 37 min
    GAN and Deep Fakes, Part 1

    GAN and Deep Fakes, Part 1

    Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and Trump deliver speeches they never gave, Gal Gadot "stars” in a porn video, and professional comedians such as Bill Hader eerily turn into the people they impersonate, like Tom Cruise and Arnold Schwarzenegger.



    What all of these videos have in common is that they were mostly created by amateur developers or small startups with tight budgets - but their quality is surprisingly good, and in some cases as good as what the biggest movie studios were able to produce with huge budgets just a few years ago.







    So what happened in the last five years, that turned special effects from being the exclusive domain of industry experts - into something a 14-year-old can create more or less at the touch of a button? Like the top end of a floating glacier, Deep Fakes are by and large only the visible product of a fascinating - and much deeper - technological revolution in the field of artificial intelligence. As we shall soon see, this revolution has the potential to put some very powerful tools in the hands of both attackers and defenders in the world of cyber-security.

    • 43 min
    Sam Curry: The 2020 Crystal Ball

    Sam Curry: The 2020 Crystal Ball

    Sam Curry is Cybereason's Chief Security Officer and an award-winning cyber security visionary. Sam & Ran discuss Sam's upcoming webinar, in which he will present his insights into what 2020 will bring for the security industry: the rise of 5G cellular networks, The US Presidential Elections, the 2020 Tokyo Olympics and more.

    • 15 min
    Human Side Channels

    Human Side Channels

    Even the best hackers are human, and humans are inescapably unique. Forensic Linguistics, Behavioral Signatures and Cultural Captchas can help defenders identify and (maybe) catch even the best of hackers.

    • 33 min

Avis d’utilisateurs

jxcr0w ,

The best hacking related podcast out there

The show is one of my absolute favorites. Not only does the host Ran Levi provide the listener with the incidents, he also goes to great lengths to explain the history of the exploits, of the incidents and of the persons involved.

All in all, Malicious Life is a truly comprehensive podcast not only informative for security savvy people, but to everyone. You do not want to miss this show.

dstoiko ,

Awesome podcast

Thanks Ran for this great collection of backstories on hacks and other infosec issues! Recommended it to friends and colleagues. That music is priceless by the way...

Classement des podcasts dans Technologies

D’autres se sont aussi abonnés à