246 episodes

Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meets Hackable- and come dig into a history you never knew existed.

Malicious Life Malicious Life

    • Technology
    • 4.8 • 887 Ratings

Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meets Hackable- and come dig into a history you never knew existed.

    The Y2K Bug, Part 2

    The Y2K Bug, Part 2

    In the waning years of the 20th century, amid growing anxieties about the turn of the millennium, one man, Robert Bemer, observed the unfolding drama from his remote home on King Possum Lake. A revered figure in computing, Bemer had early on flagged a significant, looming issue known as the Y2K bug, which threatened to disrupt global systems as calendars rolled over to the year 2000. This episode delves into Bemer's life during this critical period, exploring his predictions, the ensuing global frenzy to avert disaster, and the disparate views on whether the billions spent in prevention were justified or merely a response to a misunderstood threat.








    Advertising Inquiries: https://redcircle.com/brands

    • 31 min
    The Y2K Bug, Part 1

    The Y2K Bug, Part 1

    In the 1950s and 60s - even leading into the 1990s - the cost of storage was so high, that using a 2-digit field for dates in a software instead of 4-digits could save an organization between $1.2-$2 Million dollars per GB of data. From this perspective, programming computers in the 1950s to record four-digit years would’ve been outright malpractice. But 40 years later, this shortcut became a ticking time bomb which one man, computer scientist Bob Bemer, was trying to diffuse before it was too late.


    Advertising Inquiries: https://redcircle.com/brands

    • 27 min
    Can You Bomb a Hacker?

    Can You Bomb a Hacker?

    The 2008 Russo-Georgian War marked a turning point: the first time cyberattacks were used alongside traditional warfare. But what happens when the attackers aren't soldiers, but ordinary citizens? This episode delves into the ethical and legal implications of civilian participation in cyberwarfare, examining real-world examples from Ukraine and beyond.


    Advertising Inquiries: https://redcircle.com/brands

    • 30 min
    Kevin Mitnick, Part 2

    Kevin Mitnick, Part 2

    In 1991, Kevin Mitnick was bouncing back from what was probably the lowest point of his life. He began to rebuild his life: he started working out and lost a hundred pounds, and most importantly - he was finally on the path towards ditching his self-destructive obsession of hacking. 
    But just as he was in the process of turning his life around, his brother introduced him to a hacker named Eric Heinz, who told him about a mysterious piece of equipment he came across while breaking into Pacific Bell: SAS, a testing system that allowed its user to listen in on all the calls going through the telephone network. SAS proved to be too great of a temptation for Mitnick, who desperately wanted to wield the power that the testing system could afford him.


    Advertising Inquiries: https://redcircle.com/brands

    • 49 min
    Kevin Mitnick, Part 1

    Kevin Mitnick, Part 1

    For Kevin Mitnick - perhaps the greatest social engineer who ever lived - hacking was an obsession: even though it ruined his marriage, landed him in scary correction facilities and almost cost him his sanity in solitary confinement, Mitnick wasn't able to shake the disease that compelled him to keep breaking into more and more communication systems. 


    Advertising Inquiries: https://redcircle.com/brands

    • 37 min
    SIM Registration: Security, or Surveillance?

    SIM Registration: Security, or Surveillance?

    Right now, hundreds of thousands of people in the southern African country of Namibia are faced with a choice. At the end of next month, their phone service is going to be shut off permanently: to prevent that from happening, they’ll have to give up their data privacy. As a result, nearly two million Namibian citizens are facing a data privacy problem which may haunt them for years to come - and hundreds of thousands more are set to join them, or else they’ll lose their phone service for good. All of which raises the question: was making everybody register their SIM cards a good idea in the first place?


    Advertising Inquiries: https://redcircle.com/brands

    • 31 min

Customer Reviews

4.8 out of 5
887 Ratings

887 Ratings

The Silent Observer ,

Amazing cyber secuirty podcast

This is an amazing cyber security podcast.

Beeeee424242442424 ,

Audio is soft

Audio is uneven and it’s hard to follow unfortunately

t00thp4st3 ,

One of the best cybersecurity podcasts

After listening to couple of the most recent episodes I decided to go back and start listening from the beginning this is one of the best podcasts for people whom into cybersecurity. Thank you :)

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
In Her Ellement
Boston Consulting Group BCG
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times
TED Radio Hour
NPR

You Might Also Like

Hacked
Hacked
Darknet Diaries
Jack Rhysider
Hacking Humans
N2K Networks
Smashing Security
Graham Cluley & Carole Theriault
CYBER
VICE
Click Here
Recorded Future News