251 episódios

Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meets Hackable- and come dig into a history you never knew existed.

Malicious Life Malicious Life

    • Tecnologia
    • 4,8 • 6 classificações

Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meets Hackable- and come dig into a history you never knew existed.

    Section 230: The Law that Makes Social Media Great, and Terrible

    Section 230: The Law that Makes Social Media Great, and Terrible

    Section 230 is the pivotal law that has enabled the rise of social media -while sparking heated debates over its implications. In this episode, we're charting the history of Section 230, from early landmark legal battles, to modern controversies, and exploring its complexities and the proposed changes that could redefine online speech and platform responsibility.


    Advertising Inquiries: https://redcircle.com/brands

    • 34 min
    What Happened at Uber?

    What Happened at Uber?

    In 2016, Joe Sullivan, former CISO of Facebook, was at the peak of his career. As Uber's new CISO, he and his team had just successfully prevented data from a recent breach from leaking to the internet. But less than a year later, Sullivan was unexpectedly fired from Uber, and three years later, the US Department of Justice announced criminal charges against him.
    So, what happened at Uber?


    Advertising Inquiries: https://redcircle.com/brands

    • 37 min
    The Nigerian Prince

    The Nigerian Prince

    In this episode of ML, we're exploring the history of the well-known Nigerian Prince scam, also known as 419 or advanced fee scam, from its roots in a Parisian prison during the French Revolution, to the economic and social reason why this particular scam became so popular with African youth. Also, will AI make such scams more dangerous - or, counter intuitively, go against the interests of scammers? 


    Advertising Inquiries: https://redcircle.com/brands

    • 28 min
    Unmasking Secrets: The Rise of Open-Source Intelligence

    Unmasking Secrets: The Rise of Open-Source Intelligence

    Dive into the world of open-source intelligence (OSINT) in this episode, where we uncover how ordinary citizens use publicly available data to unravel some of the most complex global mysteries. From tracking conflicts in real-time to exposing the truth behind high-profile incidents like the downing of Malaysia Airlines flight MH17, discover how OSINT is revolutionizing the field of investigative journalism and transforming how we perceive and verify information.



    Advertising Inquiries: https://redcircle.com/brands

    • 33 min
    The Source Code of Malicious Life

    The Source Code of Malicious Life

    A few weeks ago we had a listener’s meetup in New York, and as part of that meetup, I gave a talk in which I discussed how Malicious Life came to be - a story that goes back to my days as a ship's captain in the Israeli Navy - and then about how me and Nate craft the stories that you hear every other week. That last part, I hope, might also be beneficial to those of you, our listeners, who find themselves giving talks about technically complex ideas, cyber-related or not. The storytelling ideas and techniques I laid out in the talk are universal, and you’ll find them in blockbuster movies as well as podcast episodes. 


    Advertising Inquiries: https://redcircle.com/brands

    • 47 min
    The Y2K Bug, Part 2

    The Y2K Bug, Part 2

    In the waning years of the 20th century, amid growing anxieties about the turn of the millennium, one man, Robert Bemer, observed the unfolding drama from his remote home on King Possum Lake. A revered figure in computing, Bemer had early on flagged a significant, looming issue known as the Y2K bug, which threatened to disrupt global systems as calendars rolled over to the year 2000. This episode delves into Bemer's life during this critical period, exploring his predictions, the ensuing global frenzy to avert disaster, and the disparate views on whether the billions spent in prevention were justified or merely a response to a misunderstood threat.








    Advertising Inquiries: https://redcircle.com/brands

    • 31 min

Críticas de clientes

4,8 de 5
6 classificações

6 classificações

Ivan Cantarino ,

Great podcast

This podcast has great content. Everyone should listen to it, it's super pleasant to hear.
I have been listen to them since the Curious Minds only podcast and now they took the step forward. Great.

Top de podcasts em Tecnologia

IA: A Próxima Vaga
Francisco Pinto Balsemão
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
O Futuro do Futuro
Hugo Séneca
a16z Podcast
Andreessen Horowitz
Lex Fridman Podcast
Lex Fridman

Talvez também goste

Hacked
Hacked
Darknet Diaries
Jack Rhysider
Hacking Humans
N2K Networks
Smashing Security
Graham Cluley & Carole Theriault
Click Here
Recorded Future News
CyberWire Daily
N2K Networks