The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]
Security BSides - or just 'BSides', for short' - is the first grassroots, DIY, open security conference in the world - with more than 650 events in more than 50 countries. Jack Daniel, one of BSides' founders, recalls how the conference started, and what do such 'community-oriented' events contribute that other events often cannot.
China’s Unrestricted Warfare, Part 1
Back in the 1990s, Cyberwarfare was a word rarely used in the West - and definitely unheard of in China, which was just taking it's first steps in the Internet. Two Chinese military officers, veterans of the semi-conflict with Taiwan, helped shape the role of cyber in modern warfare in China and beyond.
Can Nuclear Power Plants Be Hacked?
Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, speaks to Sr. Producer Nate Nelson about the cybersecurity of Nuclear facilities. How protected are modern nuclear power plants?
Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side]
Chris Wysopal, a cyber security pionneer and one of L0pht's founding members, talks about the group's 1998 testimony in the Senate, how they used shaming to force cooporations to fix their software, and the (not so fortunate) consequenses of the sale to @stake.
‘L0pht’, Part 2 – The End
In the early days, the L0pht guys tinkered with what they already had laying around, or could find dumpster diving. But things change, of course. By the end of the ‘90s many of the L0pht hackers had quit their day jobs, incorporating under the name “L0pht Heavy Industries”, and moving into a nicer space, the “new L0pht.” Seven days after Y2K, they merged with @stake, an internet security startup. It was a signal that hacking wasn’t just for the kids anymore.
The Story of ‘L0pht’, Part 1
'L0pht', or 'L0pht Heavy Indutries', was one of the most infuencial hacker collectives of the 90's: it's members were even invited to testify infront of the Congress on the current state of Internet security. In this episode, four L0pht's founding members - Count Zero, Weld Pond, Kingpin & Dildog - talk about the begining and influence of the L0pht on cyber security.
Great addition to my rotation
I thought I had run the gamut of cyber security podcasts. Some I am still subscribed to and others have been let go. But as I was looking for some more episodes on stuxnet, I discovered malicious life! I’ve now binged 5 different episodes of theirs and I can’t wait to listen to more. Well done and keep up the good work!
Please stop making Covid analogies
The Covid pandemic has been a traumatic roller-coaster for many people. I personally like to escape the constant stream of Covid news with podcasts that (should) tell stories of unrelated origin. However, Ran, to my dismay your incessant use of ‘pandemic’ and ‘vaccine’ and ‘cure’ is quite triggering.
Using Covid as an analogous protagonist in your stories is lazy in my opinion, and it’s anxiety inducing for me. It’s particularly bad in Not Petya parts 1 and 2, but sprinkled in throughout the episodes in 2020.
Malicious life was once a glorious escape from the incessant Covid news cycle - and I’m sad to report that even a cyber security podcast such as this has fallen victim to the Covid narrative pandering seen almost everywhere these days. Please - stop with the pandemic dialogue - it’s triggering and immediately jolts me out of the story you’re trying to tell and back into the fear and anxiety of March 2021.
Good but stop upspeaking
YOU yell every OTHER WORD at the END of EACH sentence INDEED