podcast image for Malicious Life
Malicious Life
Description

Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

Episodes
  • Episode
    Tay: A Teenage Bot Gone Rogue

    Tay: A Teenage Bot Gone RogueAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    What’s it's Like to Fight LulzSec [ML B-Side]

    What’s it's Like to Fight LulzSec [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Wild West Hackin' Fest [ML BSide]

    Wild West Hackin' Fest [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Operation Flyhook, Part 2

    Operation Flyhook, Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    IP Hijacking [ML BSide]

    IP Hijacking [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Operation Flyhook, Part 1

    Operation Flyhook, Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    In Defence Of the NSA [ML B-Side]

    In Defence Of the NSA [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Marcus Hutchins - An Accidental Hero

    Marcus Hutchins - An Accidental HeroAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Operation GhostShell

    Operation GhostShellAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Smart TVs: A New Battlefield

    Smart TVs: A New BattlefieldAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    The MITRE ATT&CK Framework

    The MITRE ATT&CK FrameworkAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    NotPetya Part 1

    NotPetya Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Facial Recognition in Law Enforcment, Part 2

    Facial Recognition in Law Enforcment, Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The Huawei Ban, Part 1

    The Huawei Ban, Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The Max Headroom Signal Hijack

    The Max Headroom Signal HijackAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    ToTok, Part 3: Becoming a Spyware Superpower

    ToTok, Part 3: Becoming a Spyware SuperpowerAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Operation Glowing Symphony

    Operation Glowing SymphonyAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    ToTok, Part 2: The Masterminds of Mobile Malware

    ToTok, Part 2: The Masterminds of Mobile MalwareAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    DIE - A New Paragidm for Cyber Security [ML B-Side]

    DIE - A New Paragidm for Cyber Security [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Cyber PTSD

    Cyber PTSDAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    How Resilient Is Our Banking System?

    How Resilient Is Our Banking System?Advertising Inquiries: https://redcircle.com/brands

  • Episode
    How Resiliant Is Our Banking System? [ML BSide]

    How Resiliant Is Our Banking System? [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Crypto AG, Part 3: The Truth Is Revealed

    Crypto AG, Part 3: The Truth Is RevealedAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Quantum Cyber Security [ML BSide]

    Quantum Cyber Security [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Crypto AG, Part 2: The Death of Bo Jr.

    Crypto AG, Part 2: The Death of Bo Jr.Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Why do APTs use Ransomeware? [ML BSide]

    Why APTs use Ransomeware? [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Crypto AG - The Greatest Espionage Operation Ever, Part 1

    Crypto AG - The Greatest Espionage Operation Ever, Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Why aren't SMBs investing in Cyber Security? [ML B-Side]

    Why aren't SMBs investing in Cyber Security? [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The Bloody Origins of Israel's Cyber Security Industry

    The Bloody Origins of Israel's Cyber Security IndustryAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Hacker Highschool: Pete Herzog [ML BSide]

    Hacker Highschool: Pete Herzog [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The Mystery of Cicada 3301

    The Mystery of Cicada 3301Advertising Inquiries: https://redcircle.com/brands

  • Episode
    How the Internet Changed the NSA

    How the Internet Changed the NSAAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Is Code === Free Speech?

    Is Code === Free Speech?Advertising Inquiries: https://redcircle.com/brands

  • Episode
    A digital 'vaccine' for Log4Shell [ML BSide]

    A digital 'vaccine' for Log4Shell [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Shawn Carpenter: A Cyber Vigliante

    Shawn Carpenter: A Cyber ViglianteAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Ransomware Attackers Don’t Take Holidays [ML B-Side]

    Ransomware Attackers Don’t Take Holidays [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Weev, Part 2

    The Electronic Frontier Foundation, long time critics of the Computer Fraud and Abuse Act, followed Weev's trial - but did not get involved. For the appeal, however, the organization decided to step it....

  • Episode
    Weev, Part 1

    Much like Aaron Swartz did, Andrew "weev" Auernheimer fought against the Computer Fraud and Abuse Act, a law both men belived to be dangerous and unjust. But unlike Swartz, the internet's own boy,...

  • Episode
    Cuckoo Spear [B-Side]

    APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin...

  • Episode
    The Man Who Went To War With Anonymous - And Lost

    Aaron Barr was en-signals intelligence officer specializing in analytics. As part of HBGary Federal, he came up with a plan to unmask the key leaders of Anonymous, the infamous hacker collective. People who...

  • Episode
    What Can Organizations Learn from "Grim Beeper"? [B-Side]

    On 17 and 18 of September 2024, thousands of pagers and hand held radio devices used by Hezbollah, exploded simultaneously across Lebanon and Syria, killing at least 42 terrorists and wounding more than...

  • Episode
    The Fappening/Celebgate

    Could thousands of people keep a secret? Common sense says no—secrets spread, and people talk. But for over a decade, from 2006 to 2017, a website managed to stay under law enforcement’s radar, despite the...

  • Episode
    Operation Snow White, Part 2

    Scientology spies were trained in all covert operations techniques: surveillance, recruiting agents, infiltrating enemy lines, and blackmail. However, a suspicious librarian and a determined FBI agent brought...

  • Episode
    Operation Snow White, Part 1

    In 1963, the FDA raided the headquaters of a budding new and esoteric religion - The Church of Scientology. In response to this and similar incidents to come, the church's founder - an eccentric science...

  • Episode
    Caught in the Crossfire: Infighting and Treason in Russia’s Cyber World

    On Dec. 5, 2016, two senior Russian Intelligence officers and two civilians were arrested and accused of treason. A few weeks later, when Western journalists were finally able to speak with the men’s lawyers,...

  • Episode
    SNAP Fraud: Getting Rich by Stealing from the Poor

    SNAP - better known as food stamps - goes back to the Great Depression. ,The physical stamps were replaced with EBT cards in the 1990s, but since these cards are without the secure EMV chip techonolgy,...

  • Episode
    The Hollywood Con Queen, Part 2

    Nicole Kotsianas, an investigator with K2 Intelligence, made it her personal mission to hunt down the Hollywood Con Queen, who crulley tormented her victioms and shattered their dreams. Nicole's efforts...

  • Episode
    The Hollywood Con Queen, Part 1

    In 2015, two aspiring script writers flew to Indonesia to meet with executives of a large Chinese film corporation. It was a trap: the Hollywood Con Queen not only coned them out of tens of thousands of...

  • Episode
    The Doomed Queen’s Secret Ciphers

    In the pre-internet era, encryption was a matter of life and death, and the motives behind these ciphers were varied and complex. Discover how George Lasry, a modern codebreaker, uncovered the secrets of...

  • Episode
    Why Did People Write Viruses In The 80s & 90s?

    Why did people write malware in the pre-internet days? Back then, there was no way to make money by writing malware. So why write them in the first place? The lack of a financial motivation meant that virus...

  • Episode
    Section 230: The Law that Makes Social Media Great, and Terrible

    Section 230 is the pivotal law that has enabled the rise of social media -while sparking heated debates over its implications. In this episode, we're charting the history of Section 230, from early...

  • Episode
    What Happened at Uber?

    In 2016, Joe Sullivan, former CISO of Facebook, was at the peak of his career. As Uber's new CISO, he and his team had just successfully prevented data from a recent breach from leaking to the internet....

  • Episode
    The Nigerian Prince

    In this episode of ML, we're exploring the history of the well-known Nigerian Prince scam, also known as 419 or advanced fee scam, from its roots in a Parisian prison during the French Revolution, to the...

  • Episode
    Unmasking Secrets: The Rise of Open-Source Intelligence

    Dive into the world of open-source intelligence (OSINT) in this episode, where we uncover how ordinary citizens use publicly available data to unravel some of the most complex global mysteries. From tracking...

  • Episode
    The Source Code of Malicious Life

    A few weeks ago we had a listener’s meetup in New York, and as part of that meetup, I gave a talk in which I discussed how Malicious Life came to be - a story that goes back to my days as a ship's captain...

  • Episode
    The Y2K Bug, Part 2

    In the waning years of the 20th century, amid growing anxieties about the turn of the millennium, one man, Robert Bemer, observed the unfolding drama from his remote home on King Possum Lake. A revered figure...

  • Episode
    The Y2K Bug, Part 1

    In the 1950s and 60s - even leading into the 1990s - the cost of storage was so high, that using a 2-digit field for dates in a software instead of 4-digits could save an organization between $1.2-$2 Million...

  • Episode
    Can You Bomb a Hacker?

    The 2008 Russo-Georgian War marked a turning point: the first time cyberattacks were used alongside traditional warfare. But what happens when the attackers aren't soldiers, but ordinary citizens? This e...

  • Episode
    Kevin Mitnick, Part 2

    In 1991, Kevin Mitnick was bouncing back from what was probably the lowest point of his life. He began to rebuild his life: he started working out and lost a hundred pounds, and most importantly - he was...

  • Episode
    Kevin Mitnick, Part 1

    For Kevin Mitnick - perhaps the greatest social engineer who ever lived - hacking was an obsession: even though it ruined his marriage, landed him in scary correction facilities and almost cost him his sanity...

  • Episode
    SIM Registration: Security, or Surveillance?

    Right now, hundreds of thousands of people in the southern African country of Namibia are faced with a choice. At the end of next month, their phone service is going to be shut off permanently: to prevent...

  • Episode
    The Mariposa Botnet

    In 2008, The 12 million PCs strong Mariposa Botnet infected almost half of Furture 100 companey - but the three men who ran it were basiclly script kiddies who didn't even knew how to code.Advertising...

  • Episode
    The Real Story of Citibank’s $10M Hack

    Valdimir Levin is often presented as "the first online bank robber," and appeares on many lists of the "Top 10 Greatest Hackers." But a few veteran Russian hackers cliam that Levin's...

  • Episode
    How to Hack Into Satellites

    About a year ago, six academics from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security set out to survey engineers and developers on the subject of satellite cybersecurity. But...

  • Episode
    Moonlight Maze

    When investigators discovered in 1996 that US military networks were being extensively hacked, they didn't realize they were witnessing the birth of what would become Russia's formidable Turla APT...

  • Episode
    Volt Typhoon

    In August 2021, a port in Houston, Texas, was attacked. Over the following months, a series of attacks occurred in various locations, reminiscent of a serial killer's pattern. Targets included...

  • Episode
    Is NSO Evil? Part 2

    By the time Forbidden Stories published its “Pegasus Project” in 2021, NSO was already knee deep in what was probably the worst PR disaster ever suffered by a cybersecurity company - and then, in November...

  • Episode
    Is NSO Evil? Part 1

    NSO Group, creator of the infamous Pegasus spyware, is widely regarded as a vile, immoral company: a sort of 21st century soldier of fortune, a mercenary in the service of corrupt and evil regimes. Yet among...

  • Episode
    Should You Pay Ransomware Attackers? A Game Theory Approach

    The FBI explicitly advises companies against paying ransomware attackers - but itself payed 4.4 million dollars worth of Bitcoin after the Colonial Pipeline attack. So, should you listen to what the experts...

  • Episode
    Silent Firewalls: The Underrepresentation of Women in Cyber

    In the vast landscape of STEM, women constitute a mere 28% of the workforce. Yet, when we zoom into the realm of cybersecurity, the number dwindles even further to a startling 20 to 24 percent. What are the...

  • Episode
    Operation Kudo

    In 1981, during the G7 Summit in Quebec, French president Francois Mitterand handen President Raegan a top secret collection of documents, called "Farewell Dossier." The information found in the...

  • Episode
    Can We Stop the AI Cyber Threat?

    Much of the cybersecurity software in use today utilizes AI, especially things like spam filters and network traffic monitors. But will all those tools be enough to stop the proliferation of malware that will...

  • Episode
    Is Generative AI Dangerous?

    Every so often, the entire landscape of cybersecurity shifts, all at once: The latest seismic shift in the field occurred just last year. So in this episode of Malicious Life we’re going to take a look into...

  • Episode
    Why aren't there more bug bounty programs?

    On the face of it, there's an obvious economic incentive for both vendors and security researchers to collaborate on disclosing vulnerabilities safely and privately. Yet bug bounty programs have gained...

  • Episode
    Roman Seleznev: Did the Punishment Fit the Crime?

    In 2019, Roman Seleznev, a 34 years-old Russian national, was sentenced to 27 years in prison: A sentence that’d make any criminal quiver. Seleznev's deeds had a horrendous effect on the 2.9 million...

  • Episode
    Sony BMG's Rootkit Fiasco

    "We made a mistake and Sony paid a terrible price.” A terrible price indeed: an arrogant and ill-advised decision to include a rootkit in its music CDs cost Sony BMG a lot of money - and painted it as a...

  • Episode
    Ad Fraud, Part 2

    In the last episode of our show, we heard the story of Methbot: an army of hundreds of thousands of bots, programmatically viewing thousands of advertisements on thousands of made-up websites in order to...

  • Episode
    Ad Fraud, Part 1

    Right now, a man named Aleksandr Zhukov is sitting in jail for one of the most financially ruinous schemes ever invented for the internet. Zhukov is guilty. He was caught and convicted under a mountain of...

  • Episode
    The Economics Of Cybersecurity

    The numbers can’t be any clearer: a DDoS attack costs less than a hundred dollars, while the price tag for mitigating it might reach tens if not hundreds of thousands of dollars. A single well crafted...

  • Episode
    The Reason You Don’t Have Data Privacy

    We’ve all experienced the creepiness of modern data trafficking, but that kind of daily annoyance is the surface of a much bigger issue: Big Tech companies such as Amazon & Microsoft are lobbying...

  • Episode
    How Entire Countries Can Lose the Internet

    Disruptions to the world’s internet cables happen more often than you think: Whether it be ship anchors or animals or saboteurs, cut a few wires in the right places and at nearly the speed of light you can...

  • Episode
    Olympic Destroyer

    In the midst of 35,000 exhilarated spectators eagerly chanting the time-honored countdown to kick off the 2018 Pyeongchang Winter Olympics, a sinister malware crept through the games' network, threatening...

  • Episode
    The Lawerence Berkeley Hack, Part 2

    Oמ May 23rd, 1989, Karl Koch - a 23 years old West German hacker who worked for the KGB - took a drive, from which he would never return: Nine days later his charred remains were found by the police in a...

  • Episode
    The Lawerence Berkeley Hack, Part 1

    Four decades ago, three quarters would’ve gone a lot further than they do today. With that kind of loose change you could’ve picked up some milk from the grocery store, or over half a gallon of gas, or a bus...

  • Episode
    Russian Propaganda, Explained [ML B-Side]

    You may have heard of the cyber operations performed by Russia. You definitely heard about the missiles being fired by Russia at Ukraine - but how about the propaganda being distributed through the different...

  • Episode
    Operation Ivy Bells

    In the early 1970's, US intelligance pointed at the possibility that the Russians have laid an underwater communication cable between two important naval bases in the Far East. The dangerous mission of...

  • Episode
    Why Do NFTs Disappear? [ML BSide]

    What happens when an NFT marketplace goes under, and disappears? You would imagine that the users’ NFTs are perfectly safe: after all, the blockchain itself is still there, right? But that’s not how things...

  • Episode
    The (Other) Problem with NFTs

    Physical artworks in museums are usually well-guarded - but digital artworks are something else entirely: in 2021 alone, scammers successfully stole 100 million dollars worth of non-fungible tokens, or NFTs....

  • Episode
    SIM Swapping Follow Up [ML B-Side]

    SIM Swapping Follow Up [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    You Should Be Afraid of SIM Swaps

    You Should Be Afraid of SIM SwapsAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    FBI vs. REvil [ML BSide]

    FBI vs. REvil [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Cyberbunker, Part 2

    Cyberbunker, Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Cyberbunker, Part 1

    Cyberbunker, Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    How Netflix Learned Cloud Security

    How Netflix Learned Cloud SecurityAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Fred Cohen: The Godfather of Computer Viruses [ML B-Side]

    Fred Cohen: The Godfather of Computer Viruses [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Thamar Reservoir

    Thamar Gindin is an Israeli scholar whose research focuses on the Persian language. For the past seven years (at least) Thamar has been a target for an endless stream of spear-phishing attempts by the Iranian...

  • Episode
    The Problem With Kernel-Mode Anti-Cheat Software

    The Problem With Kernel-Mode Anti-Cheat SoftwareAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Norse Corp.: How To NOT build a cybersecurity startup

    Norse Corp.: How To NOT build a cybersecurity startupAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Jailbreaking Tractors [ML BSide]

    Jailbreaking Tractors [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The Russian Business Network

    The Russian Business NetworkAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    What can Chess grandmasters teach us about Cyber? [ML BSide]

    What can Chess grandmasters teach us about Cyber? [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    LabMD Vs. The FTC

    LabMD Vs. The FTCAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    What Would Happen if CBS Got Hacked? [ML BSide]

    What Would Happen if CBS Got Hacked? [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Hacking Stock Markets, Part 2

    Hacking Stock Markets, Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Vishing: Voice Scams [ML BSide]

    Vishing: Voice Scams [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Hacking Stock Markets, Part 1

    Hacking Stock Markets, Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    "King Kimble": Kim DotCom

    The US government says that Kim Schmitz, better know as Kim DotCom, is the leader of a file sharing crime ring. He sees himself as a an internet freedom fighter: a fugitive on the run from vindictive...

  • Episode
    Hacking Multi-Factor Authentication

    Multi-Factor Authentication (MFA) is usually considered a better solution for authentication than just using passwords. But Roger Grimes, a veteran security professional, and a Data-Driven Defense Evangelist...

  • Episode
    Hacking Language Models

    Language models are everywhere today: they run in the background of Google Translate and other translation tools; they help operate voice assistants like Alexa or Siri; and most interestingly, they are...

  • Episode
    Software Bill of Materials (SBOMs) [ML BSide]

    Software Bill of Materials (SBOMs) [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Leo Kuvayev– The Czar of Spammers

    Criminals, particularly cyber criminals, aren’t “good” people; in most cases, they do have their own personal boundaries. Every once in a while, you encounter a criminal who’s different. Someone who seems not...

  • Episode
    "A CISO's Nightmare": Israel Baron on Railway Secuirty

    "A CISO's Nightmare": Israel Baron on Railway SecuirtyAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    “Designed by criminals, for criminals”: Operation Trojan Shield

    “Designed by criminals, for criminals”: Operation Trojan ShieldAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]

    Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Silk Road, The Amazon of Drugs - Part 2

    Silk Road, The Amazon of Drugs - Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Kurtis Minder: Ransomware Negotiations [ML BSide]

    Kurtis Minder: Ransomware Negotiations [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Silk Road: The Amazon of drugs, Part 1

    Silk Road: The Amazon of drugs, Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Jacob Goldstein: The Future of BitCoin [ML BSide]

    Jacob Goldstein: The Future of BitCoin [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The “Cypherpunks” Who Invented Private Digital Money

    The “Cypherpunks” Who Invented Private Digital MoneyAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Malicious LIVE: Celebrating 5 Years of Malicious Life

    Malicious LIVE: Celebrating 5 Years of Malicious LifeAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Hackers vs. Spies: The Stratfor Leaks, Pt. 2

    Hackers vs. Spies: The Stratfor Leaks, Pt. 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Hackers vs. Spies: The Stratfor Leaks, Pt. 1

    Hackers vs. Spies: The Stratfor Leaks, Pt. 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Catching A Cybercriminal [ML B-Side]

    Catching A Cybercriminal [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    What The LinkedIn Hack Taught Us About Storing Passwords

    What The LinkedIn Hack Taught Us About Storing PasswordsAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Operation CuckooBees [ML B-Side]

    Operation CuckooBees [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    How to Russia-Proof Your Democracy [ML BSide]

    How to Russia-Proof Your Democracy [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Op. Sundevil And The Birth of the EFF

    Op. Sundevil And The Birth of the EFFAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    MITRE Attack Flow [ML B-Sides]

    MITRE Attack Flow [ML B-Sides]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The Russia-Ukraine Cyberwar [ML B-Side]

    The Russia-Ukraine Cyberwar [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Chris Roberts: Hackers on a Plane

    Chris Roberts: Hackers on a PlaneAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Should The U.S. Ban Chinese and Russian Technology?

    Should The U.S. Ban Chinese and Russian Technology?Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Jack Rhysider, Darknet Diaries [ML B-Side]

    Jack Rhysider, Darknet Diaries [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The Tesla Hack

    The Tesla HackAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Understanding China [ML B-Side]

    Understanding China [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]

    RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    DeadRinger [ML B-Side]

    DeadRinger [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The Jester

    The JesterAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    The State of Credit Card Security [ML B-Side]

    The State of Credit Card Security [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Albert Gonzalez, Part 3

    Albert Gonzalez, Part 3Advertising Inquiries: https://redcircle.com/brands

  • Episode
    DerbyCon - Dave Kennedy [ML B-Side]

    DerbyCon - Dave Kennedy [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Albert Gonzalez, Part 2

    Albert Gonzalez, Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Jeff Moss: DEF CON [ML B-Side]

    Jeff Moss: DEF CON [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Albert Gonzales, Part 1

    Albert Gonzales, Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    THOTCON Hacking Conference [ML BSide]

    THOTCON Hacking Conference [ML BSide]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    China's Unrestricted Warfare, Part 3

    China's Unrestricted Warfare, Part 3Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]

    Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    RSA Breach, Part 2

    RSA Breach, Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    RSA Breach: The Untold Story, Part 1

    RSA Breach: The Untold Story, Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    China's Unrestricted Warfare, Part 2

    China's Unrestricted Warfare, Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]

    Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    China's Unrestricted Warfare, Part 1

    China's Unrestricted Warfare, Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Can Nuclear Power Plants Be Hacked?

    Can Nuclear Power Plants Be Hacked?Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]

    Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    L0pht, Part 2

    L0pht, Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The Story of 'L0pht', Part 1

    The Story of 'L0pht', Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    MS Exchange Hack [ML B-Side]

    MS Exchange Hack [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

  • Episode
    NotPetya Part 2

    When the NotPetya pandemic hit, Cyber Analyst Amit Serper was sitting in his parents' living room, getting ready to go out with a few friends. He didn't have most of his tools with him, but he...

  • Episode
    Should Law Enforcement Use Facial Recognition? Pt. 1

    Should Law Enforcement Use Facial Recognition? Pt. 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Clearview AI

    Clearview AIAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Breaking Into Buildings

    Breaking Into Buildings Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Special: The Solarwinds Hack

    Special: The Solarwinds HackAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    100th Episode Special

    Best Stories You MissedAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Jan Sloot's Incredible Digital Coding System

    Jan Sloot's Incredible Digital Coding SystemAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Op. GUNMAN & The World's First Keylogger

    Op. GUNMAN & The World's First KeyloggerAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Election Hacking, Part 2

    Election Hacking, Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Election Hacking, Part 1

    Election Hacking, Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    MDR Vs. The TrickBot Gang

    MDR Vs. The TrickBot GangAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Yahoo's Ugly Death, Part 2

    Yahoo's Ugly Death, Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Yahoo's Ugly Death, Part 1

    Yahoo's Ugly Death, Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The Great Firewall of China, Pt. 2: Cisco's Trial

    The Great Firewall of China, Pt. 2: Cisco's TrialAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    The Great Firewall of China - Part 1

    The Great Firewall of China - Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Troy Hunt - Interview

    Troy Hunt - InterviewAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Multi-Stage Ransomware (Live)

    Multi-Stage Ransomware (Live)Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Protecting The Panama Papers Whistleblower

    Protecting The Panama Papers WhistleblowerAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    From Ransomware To Blackmail, With Assaf Dahan

    From Ransomware To Blackmail, With Assaf DahanAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    SegWit2x, Part 3

    SegWit2x, Part 3Advertising Inquiries: https://redcircle.com/brands

  • Episode
    SegWit2x Part 2

    SegWit2x Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Hacking Fortnite Accounts (CPRadio)

    Hacking Fortnite Accounts (CPRadio)Advertising Inquiries: https://redcircle.com/brands

  • Episode
    SegWit2x, or - The Year Bitcoiners Will Never Forget, Part 1

    SegWit2x, or - The Year Bitcoiners Will Never ForgetAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    No Honor Among Thieves

    No Honor Among ThievesAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Maintaining Secure Business Continuity With A Remote Workforce - With Sam Curry

    Maintaining Secure Business Continuity With A Remote Workforce - With Sam CurryAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    The Problem With Passwords

    The Problem With PasswordsAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Steven Wozniak Interview, Deep 2017

    Steven Wozniak Interview, Deep 2017Advertising Inquiries: https://redcircle.com/brands

  • Episode
    The Hauwei Ban, Part 2

    The Hauwei Ban, Part 2Advertising Inquiries: https://redcircle.com/brands

  • Episode
    ToTok, Part 1: How to Convince Someone to Download Spyware

    ToTok, Part 1: How to Convince Someone to Download SpywareAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    How To Defend A Bank, Pt. II: Right of Bang

    How To Defend A Bank, Pt. II: Right of BangAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    How To Defend A Bank, Part 1: Fusion Centers

    How To Defend A Bank, Part 1: Fusion CentersAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Triton, Part 2: The World’s Most Dangerous Malware

    Triton, Part 2: The World’s Most Dangerous MalwareAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Triton Part 1

    Triton Part 1Advertising Inquiries: https://redcircle.com/brands

  • Episode
    Deep Fakes, Part 2: Man Vs. Machine

    Deep Fakes are set to revolutionize content creation, but alongside this technology's benefits, it also has the potential two sow havoc, fear, and distrust via Social Networks. Just this week, Facebook...

  • Episode
    GAN and Deep Fakes, Part 1

    Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and Trump deliver speeches they never gave, Gal Gadot "stars” in a porn video, and...

  • Episode
    Sam Curry: The 2020 Crystal Ball

    Sam Curry: The 2020 Crystal BallAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    Human Side Channels

    Human Side ChannelsAdvertising Inquiries: https://redcircle.com/brands

  • Episode
    What's the problem with Cyber Insurance?

    Thousands of companies are losing millions of dollars to cyber attacks. An insurance seems an ideal solution to their woes - yet this kind of insurance is much less common today, than it should be. What's...

  • Episode
    Gozi B-Side: Amit Serper & Sam Curry

    Nate Nelson speaks with Amit Serper & Sam Curry, notable veteran in Cyber Security, about Malware-As-A-Service, bullet-proof hosting, avoiding the lure of the 'dark side' and more.Advertising...

  • Episode
    Gozi Part 2

    In 2010, Nikita Kuzmin returned to the malware scene with Gozi 2.0, an improved version of the successful banking Trojan. How did Gozi 2.0 fair against Zeus & the new generation of Trojans, and what can...

  • Episode
    EP61: Prying Eyes

    Roughly 600,000 laptops are lost every year in US airports alone: some reports say a laptop is stolen every minute. How hard is it to hack into a stolen laptop? "Hackable?", McAfee's Cyber...

  • Episode
    EP60: ML B-Side: Lodrian Cherne On Stalkerware

    In this out-of-band episode, we're bringing you the full interview with Lodrina Cherne, a Digital Forensics Expert, on Spyware : what is it, how it works, who sells it, and how you can avoid it...

  • Episode
    EP59: Gozi, Part 1: The Rise of Malware-as-a-Service

    Nikita Kuzmin could have been a whiz programmer or a CEO of a successful startup. But as a teen in Moscow, he fell in with the wrong crowd, and his entrepreneurial skills found a different path: Gozi, the...

  • Episode
    EP58: How is Spyware Legal?

    Today's Cyber Stalkers have free access to almost government-grade spyware software with which they can terrorize their victims. Who's enabling the commercial spyware market? Advertising Inquiries:...

  • Episode
    EP57: Listeners Survey Special

    Ran and Eliad Kimhy, one of the show's top producers, discuss the recent Listener's Survey results: what do like and dislike about the show, ideas you gave us for future improvements - and what do our...

  • Episode
    EP56: Operation Aurora, Part 2

    Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his own name -...

  • Episode
    EP55: Operation Aurora, Part 1

    In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and often...

  • Episode
    Responding to a Cyber Attack with Missiles

    Should governments responde to cyber attack with deadly force? Senior researcher Mikko Hypponen and Prof. Itzik Ben Israel (Ret. General, IDF R&D) discuss this sensative question.Advertising Inquiries:...

  • Episode
    EP53: Are Ad Blockers Malicious?

    Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by some blockers...

  • Episode
    ML_Conficker

    Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure. Advertising Inquiries:...

  • Episode
    Operation SoftCell

    A rare, inside look, at how Cybereason's researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the...

  • Episode
    'Pa Bell' Vs. Youth International Party Line

    The YIPL phreaking magazine was the spiritual predecessor to the better-known '2600' zine, and it was founded by a ideological party determined to bring down the largest monopoly in US history: Bell...

  • Episode
    The U.S vs. Gary McKinnon

    After the Challenger Disaster of 1986, NASA had a hard time convincing the public that the Galileo spacecraft, fueled by radioactive Plutonium, is safe to launch. The WANK worm, it turns out, was a message...

  • Episode
    The WANK Worm, Part 2

    After the Challenger Disaster of 1986, NASA had a hard time convincing the public that the Galileo spacecraft, fueled by radioactive Plutonium, is safe to launch. The WANK worm, it turns out, was a message...

  • Episode
    The WANK Worm, Part 1

    On October 16th, 1989, NASA's scientists went into work preparing to launch a spacecraft that very day. But when they sat down to their computers, they were met with an unexpected greeting: “Your system...

  • Episode
    The Equifax Data Breach Pt. II: The Bits Hit The Fan

    After its momentous breach, Equifax's CEO Richard Smith said: “Equifax will not be defined by this incident, but rather by how we respond.” Well, he was spot on, but not in a good way. The post The...

  • Episode
    The Equifax Data Breach Pt. I: A Big Data Bubble

    In their 120 year history, Equifax never sold anything, or provided any service to ordinary folks - except collect DATA. In 2017, that huge data repository, a 1000 times larger then the Library of Congress,...

  • Episode
    DeCSS: Hackers Vs Hollywood

    Twenty years ago, a 15-years old Norwegian kid was put on trial for breaking the DVD Copy Prevention system. His case spawned a whole new "artistic" movement... The post DeCSS: Hackers Vs Hollywood...

  • Episode
    Marconi & The Maskelyne Affair

    Guglielmo Marconi--the beloved, hated, disputed inventor of radio--gets trolled by a mustached magician in the world’s first ever, wireless, grey hat hack. The post Marconi & The Maskelyne Affair appeared...

  • Episode
    The Fall Of Mt. Gox – Part 2

    In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside.  The post The Fall Of...

  • Episode
    The Location Data Brokers – A CYBER Podcast Special

    CYBER is a new podcast from Motherboard, a very well known and respected technology blog and online magazine. The episode you’ll hear shortly is about the shady market of data aggregators and brokers who sell...

  • Episode
    The Fall Of Mt. Gox – Part 1

    In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside.  The post The Fall Of...

  • Episode
    Black Duck Eggs: Darknet Diaries

    This week we're doing an episode swap with the excellent podcast Darknet Diaries. A former NSA agent who has gone off to be a security consultant, tells a story about an assignment that he'll never...

  • Episode
    Dave Kennedy: The Psychological Principles of Social Engineering

    Today on Malicious Life, tens of thousands of people get robbed. Then a community gets together to ask: should we take our money back, or let the hacker walk with it? The post Dave Kennedy: The Psychological...

  • Episode
    The Ethereum DAO Hack

    Today on Malicious Life, tens of thousands of people get robbed. Then a community gets together to ask: should we take our money back, or let the hacker walk with it? The post The Ethereum DAO Hack appeared...

  • Episode
    The Jerusalem Virus, Part 2

    How did the Jerusalem virus trigger the birth of the entire Anti Virus industry in Israel? A high-stakes wager on Live TV, and more. The post The Jerusalem Virus, Part 2 appeared first on Malicious...

  • Episode
    The Jerusalem Virus, Part 1

    Although scary, the Jerusalem virus, discovered in Israel in 1987, was in fact a rather simple virus. How, then, did the virus trigger the birth of an entire national industry? The post The Jerusalem Virus,...

  • Episode
    Gene Spafford on the Morris Worm & Cyber-security in the 1980’s

    Eugene Spafford (aka Spaf), a professor of computer science at Purdue University, was the first researcher to publish a detailed analysis of the infamous Morris Worm. Gene talks to Ran about this incident, as...

  • Episode
    China Vs. Github

    It’s a weapon that harnessed the strength of millions of computers at once: a cannon so powerful it could break through any wall, take down any website. It is “the Great Cannon”. The post China Vs. Github...

  • Episode
    The Ashley Madison Hack, Part 2

    On the second installment of our Ashely Madison hack retelling, we look at the fallout of one of the hack, and the people who’ve suffered from it. The post The Ashley Madison Hack, Part 2 appeared first on...

  • Episode
    The Ashley Madison Hack, Part 1

    When Ashley Madison got hacked, it made international headlines. Why? Because it wasn’t just a major event. It demonstrated how there’s information even more sensitive, even more significant than your credit...

  • Episode
    Interview Special: Graham Cluley

    As we prepare to release an awesome 2-part story in two weeks, we decided to give you a chance to go back to some old favorites and check out some of the behind-the-scenes interviews of Malicious Life. Graham...

  • Episode
    The Target Hack

    If movies have taught me anything, it’s that if you want to rob a bank, you dress as the cleaning crew. The people behind the Target hack must have seen one action film too many, because when they decided to...

  • Episode
    WoW: Corrupted Blood

    How does the outbreak of a “plague” inside a video game- a bug, essentially- affect real-life disease research? The post WoW: Corrupted Blood appeared first on Malicious Life.Advertising Inquiries:...

  • Episode
    The Stuxnet Virus Pt. 3

    Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of the modern...

  • Episode
    The Stuxnet Virus Pt. 2

    Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way to its...

  • Episode
    The Stuxnet Virus Pt. 1

    Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever. Dubbed...

  • Episode
    Shamoon – The Biggest Hack In History

    The Shammon Virus. There is a single company, run by a royal family, which employs the majority of the Saudi working population. It’s worth more than Apple, Google, and Amazon…by a lot. The Saudi Aramco oil...

  • Episode
    The Melissa Virus

    Not all malware is created equal. Some malware will attempt to erase your files, demand ransom, or steal your information. Others will do no such thing- and still end up being worse. Don’t believe us? What if...

  • Episode
    GhostNet

    A young woman is arrested by the Chinese government while trying to cross the border to Tibet. Her interrogator, a Chinese spy, pulls out a dossier full of information regarding her activity online. It turns...

  • Episode
    The Morris Worm Pt. 2

    In an attempt to halt the Morris worm’s path of destruction, a systems administrator at Harvard shut down the university router through which Andy Sudduth’s message would be sent to the internet. The post...

  • Episode
    The Morris Worm Pt. 1

    We’ve introduced you to some of the seminal malware attacks that have shaped cybersecurity history. Perhaps no other incident in history, though, has had the effect on how we think about computer security...

  • Episode
    The Half Life 2 Hack

    How far should a die-hard fan go, in order to bring closer to them the thing that they love? In one of the most interesting, yet relatively unknown cybersecurity stories, a young hacker attempts to steal his...

  • Episode
    The Legalities of the Cyber War

    Catching a criminal is by no means easy, but there’s something we take for granted in any crime: that the criminal has a face and a name, that they used a specific weapon on a specific target, and that the...

  • Episode
    Fancy Bear, Cozy Bear

    When representatives from the Democratic National Committee reached out to a silicon valley cybersecurity company, to investigate a potential breach in their computer system, it’s hard to imagine what they...

  • Episode
    Hack Back

    Those who have experienced a cybercrime know the feelings of frustration and helplessness that come along with it. A hacker could be halfway across the world when they attack you, and you might have no way of...

  • Episode
    Cyber Terrorism

    What governments and powerful organizations regularly use, others will find ways to use as well. Cyber activity fits so incredibly well with terrorism. Actors can remain hidden, or reveal themselves to the...

  • Episode
    Super Spies

    The NSA has many means at its disposal. But how does it use these means, and for what goals? Discover the (literally) secret history of the NSA’s cyber activity. Travel with us to Russia and back, learn the...

  • Episode
    The Trojan Horse Affair

    The early 2000s were an interesting time in Information Security. This is roughly the period when malware transitioned from viruses written by teenagers for fun, to cybercrime tools in the hands of...

  • Episode
    Amit Serper Interview- Holiday Special Episode

    It’s the holidays and everyone’s on vacation – but the Internet never rests and neither do the bad guys in cybersecurity. So, for this holiday special, we figured we’ll air an interesting interview we did a...

  • Episode
    Weapons of Mass Disruption

    The threat of fire and fury stands at the center of all modern conflicts- nuclear bombs that can eradicate life in seconds are the ultimate weapon of war, as they pose a huge threat to centers of population....

  • Episode
    The Soldiers of North Korea

    Guerrilla warfare has been around for as long as conventional warfare has. The idea that a small force, through cunning and brazen action, could overtake a larger force is an old one. From pirates who would...

  • Episode
    The Propaganda

    Governments around the world have been making devious use of the internet as a platform to spread, not malware, but propaganda. As in all wars, propaganda is a huge part of the modern cyber war. Join us as we...

  • Episode
    The Whistleblowers

    WikiLeaks has ushered in a new age in whistle blowing: Modern leakers such as Chelsea Manning – who’s story is the focus of our current episode – expose huge amounts of confidential information. But can these...

  • Episode
    Stuxnet, part 3

    Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of the modern...

  • Episode
    Stuxnet, part 2

    Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way to its...

  • Episode
    Stuxnet, part 1

    Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever. Dubbed...

  • Episode
    Hell to Pay

    A global FBI manhunt for the world’s most wanted cyber criminal ends in the capture of a massive criminal network, but with the escape of the man himself. Security experts who operate within the gray areas of...

  • Episode
    The Roots of Evil

    WannaCry’s widespread cyber attack on more than 200,000 computers all over the world made headlines – but only a few people remember a similar attack, named The AIDS Trojan, almost 30 years earlier… In this...

  • Episode
    Big Cannons

    2016 is known throughout the circles of information security as “The Year of The DDoS Attacks”, and rightfully so: 5 large scale DDoS attacks – ‘Distributed Denial Of Service’ – shocked the technology world....

  • Episode
    Spam Empire

    In this episode of Malicious Life, we take a look at one of the oldest forms of criminal activity on the web- the spam empires of the 90’s and 2000’s. Find out how these multi-million dollar industries...

  • Episode
    The Dark Avenger

    In 1989, a message was found in a virus: “Eddie Lives…Somewhere in Time!”. ‘Eddie’ was a particularly nasty virus, and its discovery led a young Bulgarian security researcher down a rabbit hole, on a hunt for...

  • Episode
    Ghost In The Machine

    Cybercrime is one of the most notable threats we face as computer users, nowadays. But it wasn’t always so. Those of us who’ve been in the field long enough may remember a time when computer viruses were much...