151 episodes

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

Malicious Life Cybereason

    • Technology
    • 5.0 • 1 Rating

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

    The Bloody Origins of Israel’s Cyber Security Industry

    The Bloody Origins of Israel’s Cyber Security Industry

    Israel is a small country - yet its cyber security industry is exceptionally successful. In this episode, we go back to the Yom Kippur War of 1973, to discover how a national trauma and an Intelligence failure paved the way for Israel to become a cyber security mini-empire.

    • 35 min
    Hacker Highschool: Pete Herzog [ML BSide]

    Hacker Highschool: Pete Herzog [ML BSide]

    Pete Hertzog is a security expert and an educator with a vision: he wants our kids to learn about cybersecurity, and not just about not talking to strangers online - he wants them to learn even more advanced stuff, such as security analysis and hacking. Pete spoke with Nate Nelson about his Hacker Highschool initiative, and the lessons he learned from it.

    • 28 min
    The Mystery of Cicada 3301

    The Mystery of Cicada 3301

    "Hello. We are looking for highly intelligent individuals. To find them, we have devised a test." These words, found in a message posted on 4Chan in January 2012, started a global 'treasure hunt' - with thousands of puzzle-loving and curious individuals desperately competing with one another to be the first to crack the devilish puzzles created by the mysterious Cicada 3301. Who is Cicada, and what are their goals?

    • 35 min
    How the Internet Changed the NSA [ML BSide]

    How the Internet Changed the NSA [ML BSide]

    In the late ’80s to early 2000s, the NSA transitioned from being a hardware-first organization - that is, creating and operating physical spying devices - to software-first: excelling in hacking networks, tracking people online, etc. That transition was by no means easy: the NSA, by that point, was a huge organization - and big organizations are notorious for being very resistant to change. Jeff Man, our guest today, was one of the first people at the NSA to make the transition from hardware to software, and he shares with us his experiences from that period.

    • 36 min
    Does Code === Free Speech?

    Does Code === Free Speech?

    When the FBI asked Apple, following the 2015 mass shooting in San Bernardino, to write code that would give the FBI access to a suspect's iPhone - Apple refused, arguing that forcing it to write code goes against the First Amendment. Apple's claim wasn't the first time that this highly controversial claim was invoked in judicial proceedings…

    • 30 min
    A digital ‘vaccine’ for Log4Shell [ML BSide]

    A digital ‘vaccine’ for Log4Shell [ML BSide]

    A digital 'vaccine' was released to address Log4Shell, which has been called 'the single biggest, most critical vulnerability ever.' Nate Nelson talks to Yonatan Striem-Amit, CTO & Co-Founder of Cybereason (our sponsor) about the vulnerability, and about Cybereason's unusual vaccine: software that uses the same vulnerability to close the breach.

    • 19 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In Technology

Jack Rhysider
Rami AP
Vox Media Podcast Network
Adweek
Where It Happens
CodeNewbie

You Might Also Like

Jack Rhysider
VICE
CyberWire Inc.
Graham Cluley, Carole Theriault
CyberWire, Inc.