253 episodes

Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meets Hackable- and come dig into a history you never knew existed.

Malicious Life Malicious Life

    • Technology
    • 4.8 • 894 Ratings

Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meets Hackable- and come dig into a history you never knew existed.

    The Doomed Queen’s Secret Ciphers

    The Doomed Queen’s Secret Ciphers

    In the pre-internet era, encryption was a matter of life and death, and the motives behind these ciphers were varied and complex. Discover how George Lasry, a modern codebreaker, uncovered the secrets of Mary, Queen of Scots, hidden in the French National Library for over 400 years. This episode delves into the painstaking process and the historical impact of decoding these ancient messages, revealing the hidden motives and desperate actions of a doomed queen.


    Our Sponsors:
    * Check out Kiteworks: kiteworks.com


    Advertising Inquiries: https://redcircle.com/brands

    • 30 min
    Why Did People Write Viruses In The 80s & 90s?

    Why Did People Write Viruses In The 80s & 90s?

    Why did people write malware in the pre-internet days? Back then, there was no way to make money by writing malware. So why write them in the first place? The lack of a financial motivation meant that virus authors had a plethora of other motives - and this diverse mix of motives had, as we shall hear, an interesting effect on the design and style of viruses created at that period.



    Our Sponsors:
    * Check out Kiteworks: kiteworks.com


    Advertising Inquiries: https://redcircle.com/brands

    • 27 min
    Section 230: The Law that Makes Social Media Great, and Terrible

    Section 230: The Law that Makes Social Media Great, and Terrible

    Section 230 is the pivotal law that has enabled the rise of social media -while sparking heated debates over its implications. In this episode, we're charting the history of Section 230, from early landmark legal battles, to modern controversies, and exploring its complexities and the proposed changes that could redefine online speech and platform responsibility.


    Our Sponsors:
    * Check out Kiteworks: kiteworks.com


    Advertising Inquiries: https://redcircle.com/brands

    • 34 min
    What Happened at Uber?

    What Happened at Uber?

    In 2016, Joe Sullivan, former CISO of Facebook, was at the peak of his career. As Uber's new CISO, he and his team had just successfully prevented data from a recent breach from leaking to the internet. But less than a year later, Sullivan was unexpectedly fired from Uber, and three years later, the US Department of Justice announced criminal charges against him.
    So, what happened at Uber?


    Our Sponsors:
    * Check out Kiteworks: kiteworks.com


    Advertising Inquiries: https://redcircle.com/brands

    • 37 min
    The Nigerian Prince

    The Nigerian Prince

    In this episode of ML, we're exploring the history of the well-known Nigerian Prince scam, also known as 419 or advanced fee scam, from its roots in a Parisian prison during the French Revolution, to the economic and social reason why this particular scam became so popular with African youth. Also, will AI make such scams more dangerous - or, counter intuitively, go against the interests of scammers? 


    Our Sponsors:
    * Check out Kiteworks: kiteworks.com


    Advertising Inquiries: https://redcircle.com/brands

    • 28 min
    Unmasking Secrets: The Rise of Open-Source Intelligence

    Unmasking Secrets: The Rise of Open-Source Intelligence

    Dive into the world of open-source intelligence (OSINT) in this episode, where we uncover how ordinary citizens use publicly available data to unravel some of the most complex global mysteries. From tracking conflicts in real-time to exposing the truth behind high-profile incidents like the downing of Malaysia Airlines flight MH17, discover how OSINT is revolutionizing the field of investigative journalism and transforming how we perceive and verify information.



    Our Sponsors:
    * Check out Kiteworks: kiteworks.com


    Advertising Inquiries: https://redcircle.com/brands

    • 33 min

Customer Reviews

4.8 out of 5
894 Ratings

894 Ratings

yopoctopus ,

One of the best! Great stories!

This is one of the best storytelling podcasts out there!

There is a lot of room for improvement with the audio quality, especially for guest audio and impersonations.

Slayer123491 ,

Great Story Telling!

This series has been extremely fun to listen to and for someone who has interest in cyber security it gives great insight into the history of cybersecurity why it’s needed today while providing a great story along the way!

Bradg001 ,

Love this show

This is a well done podcast. The stories are captivating and keep me entertained while exercising or driving. I look forward to finishing the series.

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
The Vergecast
The Verge
TED Radio Hour
NPR

You Might Also Like

Hacked
Hacked
Darknet Diaries
Jack Rhysider
Hacking Humans
N2K Networks
Smashing Security
Graham Cluley & Carole Theriault
Click Here
Recorded Future News
CyberWire Daily
N2K Networks