150 episodes

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

Malicious Life Cybereason

    • Technology

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

    Hacker Highschool: Pete Herzog [ML BSide]

    Hacker Highschool: Pete Herzog [ML BSide]

    In the late ’80s to early 2000s, the NSA transitioned from being a hardware-first organization - that is, creating and operating physical spying devices - to software-first: excelling in hacking networks, tracking people online, etc. That transition was by no means easy: the NSA, by that point, was a huge organization - and big organizations are notorious for being very resistant to change. Jeff Man, our guest today, was one of the first people at the NSA to make the transition from hardware to software, and he shares with us his experiences from that period.

    • 28 min
    The Mystery of Cicada 3301

    The Mystery of Cicada 3301

    "Hello. We are looking for highly intelligent individuals. To find them, we have devised a test." These words, found in a message posted on 4Chan in January 2012, started a global 'treasure hunt' - with thousands of puzzle-loving and curious individuals desperately competing with one another to be the first to crack the devilish puzzles created by the mysterious Cicada 3301. Who is Cicada, and what are their goals?

    • 35 min
    How the Internet Changed the NSA [ML BSide]

    How the Internet Changed the NSA [ML BSide]

    In the late ’80s to early 2000s, the NSA transitioned from being a hardware-first organization - that is, creating and operating physical spying devices - to software-first: excelling in hacking networks, tracking people online, etc. That transition was by no means easy: the NSA, by that point, was a huge organization - and big organizations are notorious for being very resistant to change. Jeff Man, our guest today, was one of the first people at the NSA to make the transition from hardware to software, and he shares with us his experiences from that period.

    • 36 min
    Does Code === Free Speech?

    Does Code === Free Speech?

    When the FBI asked Apple, following the 2015 mass shooting in San Bernardino, to write code that would give the FBI access to a suspect's iPhone - Apple refused, arguing that forcing it to write code goes against the First Amendment. Apple's claim wasn't the first time that this highly controversial claim was invoked in judicial proceedings…

    • 30 min
    A digital ‘vaccine’ for Log4Shell [ML BSide]

    A digital ‘vaccine’ for Log4Shell [ML BSide]

    A digital 'vaccine' was released to address Log4Shell, which has been called 'the single biggest, most critical vulnerability ever.' Nate Nelson talks to Yonatan Striem-Amit, CTO & Co-Founder of Cybereason (our sponsor) about the vulnerability, and about Cybereason's unusual vaccine: software that uses the same vulnerability to close the breach.

    • 19 min
    Shawn Carpenter: A Cyber Vigilante

    Shawn Carpenter: A Cyber Vigilante

    In 2003, Shawn Carpenter - an employee of Sandia National Laboratory - was at a crossroads: should he ignore a Chinese attack against U.S. targets, as his superiors ordered him to do - or do what he thinks is right, and continue investigating the case on his own?

    • 37 min

Top Podcasts In Technology

Jack Rhysider
Google
Richard Campbell
TechSparrow
FTM Alerts

You Might Also Like

Jack Rhysider
VICE
CyberWire Inc.
CyberWire, Inc.
Graham Cluley, Carole Theriault