Description
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Episodes
- EpisodeTay: A Teenage Bot Gone RogueTay: A Teenage Bot Gone RogueAdvertising Inquiries: https://redcircle.com/brands
- EpisodeWhat’s it's Like to Fight LulzSec [ML B-Side]What’s it's Like to Fight LulzSec [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeWild West Hackin' Fest [ML BSide]Wild West Hackin' Fest [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeOperation Flyhook, Part 2Operation Flyhook, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeIP Hijacking [ML BSide]IP Hijacking [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeOperation Flyhook, Part 1Operation Flyhook, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeIn Defence Of the NSA [ML B-Side]In Defence Of the NSA [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeMarcus Hutchins - An Accidental HeroMarcus Hutchins - An Accidental HeroAdvertising Inquiries: https://redcircle.com/brands
- EpisodeOperation GhostShellOperation GhostShellAdvertising Inquiries: https://redcircle.com/brands
- EpisodeSmart TVs: A New BattlefieldSmart TVs: A New BattlefieldAdvertising Inquiries: https://redcircle.com/brands
- EpisodeThe MITRE ATT&CK FrameworkThe MITRE ATT&CK FrameworkAdvertising Inquiries: https://redcircle.com/brands
- EpisodeNotPetya Part 1NotPetya Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeFacial Recognition in Law Enforcment, Part 2Facial Recognition in Law Enforcment, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Huawei Ban, Part 1The Huawei Ban, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Max Headroom Signal HijackThe Max Headroom Signal HijackAdvertising Inquiries: https://redcircle.com/brands
- EpisodeToTok, Part 3: Becoming a Spyware SuperpowerToTok, Part 3: Becoming a Spyware SuperpowerAdvertising Inquiries: https://redcircle.com/brands
- EpisodeOperation Glowing SymphonyOperation Glowing SymphonyAdvertising Inquiries: https://redcircle.com/brands
- EpisodeToTok, Part 2: The Masterminds of Mobile MalwareToTok, Part 2: The Masterminds of Mobile MalwareAdvertising Inquiries: https://redcircle.com/brands
- EpisodeDIE - A New Paragidm for Cyber Security [ML B-Side]DIE - A New Paragidm for Cyber Security [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeCyber PTSDCyber PTSDAdvertising Inquiries: https://redcircle.com/brands
- EpisodeHow Resilient Is Our Banking System?How Resilient Is Our Banking System?Advertising Inquiries: https://redcircle.com/brands
- EpisodeHow Resiliant Is Our Banking System? [ML BSide]How Resiliant Is Our Banking System? [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeCrypto AG, Part 3: The Truth Is RevealedCrypto AG, Part 3: The Truth Is RevealedAdvertising Inquiries: https://redcircle.com/brands
- EpisodeQuantum Cyber Security [ML BSide]Quantum Cyber Security [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeCrypto AG, Part 2: The Death of Bo Jr.Crypto AG, Part 2: The Death of Bo Jr.Advertising Inquiries: https://redcircle.com/brands
- EpisodeWhy do APTs use Ransomeware? [ML BSide]Why APTs use Ransomeware? [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeCrypto AG - The Greatest Espionage Operation Ever, Part 1Crypto AG - The Greatest Espionage Operation Ever, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeWhy aren't SMBs investing in Cyber Security? [ML B-Side]Why aren't SMBs investing in Cyber Security? [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Bloody Origins of Israel's Cyber Security IndustryThe Bloody Origins of Israel's Cyber Security IndustryAdvertising Inquiries: https://redcircle.com/brands
- EpisodeHacker Highschool: Pete Herzog [ML BSide]Hacker Highschool: Pete Herzog [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Mystery of Cicada 3301The Mystery of Cicada 3301Advertising Inquiries: https://redcircle.com/brands
- EpisodeHow the Internet Changed the NSAHow the Internet Changed the NSAAdvertising Inquiries: https://redcircle.com/brands
- EpisodeIs Code === Free Speech?Is Code === Free Speech?Advertising Inquiries: https://redcircle.com/brands
- EpisodeA digital 'vaccine' for Log4Shell [ML BSide]A digital 'vaccine' for Log4Shell [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeShawn Carpenter: A Cyber ViglianteShawn Carpenter: A Cyber ViglianteAdvertising Inquiries: https://redcircle.com/brands
- EpisodeRansomware Attackers Don’t Take Holidays [ML B-Side]Ransomware Attackers Don’t Take Holidays [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeWeev, Part 2The Electronic Frontier Foundation, long time critics of the Computer Fraud and Abuse Act, followed Weev's trial - but did not get involved. For the appeal, however, the organization decided to step it....
- EpisodeWeev, Part 1Much like Aaron Swartz did, Andrew "weev" Auernheimer fought against the Computer Fraud and Abuse Act, a law both men belived to be dangerous and unjust. But unlike Swartz, the internet's own boy,...
- EpisodeCuckoo Spear [B-Side]APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin...
- EpisodeThe Man Who Went To War With Anonymous - And LostAaron Barr was en-signals intelligence officer specializing in analytics. As part of HBGary Federal, he came up with a plan to unmask the key leaders of Anonymous, the infamous hacker collective. People who...
- EpisodeWhat Can Organizations Learn from "Grim Beeper"? [B-Side]On 17 and 18 of September 2024, thousands of pagers and hand held radio devices used by Hezbollah, exploded simultaneously across Lebanon and Syria, killing at least 42 terrorists and wounding more than...
- EpisodeThe Fappening/CelebgateCould thousands of people keep a secret? Common sense says no—secrets spread, and people talk. But for over a decade, from 2006 to 2017, a website managed to stay under law enforcement’s radar, despite the...
- EpisodeOperation Snow White, Part 2Scientology spies were trained in all covert operations techniques: surveillance, recruiting agents, infiltrating enemy lines, and blackmail. However, a suspicious librarian and a determined FBI agent brought...
- EpisodeOperation Snow White, Part 1In 1963, the FDA raided the headquaters of a budding new and esoteric religion - The Church of Scientology. In response to this and similar incidents to come, the church's founder - an eccentric science...
- EpisodeCaught in the Crossfire: Infighting and Treason in Russia’s Cyber WorldOn Dec. 5, 2016, two senior Russian Intelligence officers and two civilians were arrested and accused of treason. A few weeks later, when Western journalists were finally able to speak with the men’s lawyers,...
- EpisodeSNAP Fraud: Getting Rich by Stealing from the PoorSNAP - better known as food stamps - goes back to the Great Depression. ,The physical stamps were replaced with EBT cards in the 1990s, but since these cards are without the secure EMV chip techonolgy,...
- EpisodeThe Hollywood Con Queen, Part 2Nicole Kotsianas, an investigator with K2 Intelligence, made it her personal mission to hunt down the Hollywood Con Queen, who crulley tormented her victioms and shattered their dreams. Nicole's efforts...
- EpisodeThe Hollywood Con Queen, Part 1In 2015, two aspiring script writers flew to Indonesia to meet with executives of a large Chinese film corporation. It was a trap: the Hollywood Con Queen not only coned them out of tens of thousands of...
- EpisodeThe Doomed Queen’s Secret CiphersIn the pre-internet era, encryption was a matter of life and death, and the motives behind these ciphers were varied and complex. Discover how George Lasry, a modern codebreaker, uncovered the secrets of...
- EpisodeWhy Did People Write Viruses In The 80s & 90s?Why did people write malware in the pre-internet days? Back then, there was no way to make money by writing malware. So why write them in the first place? The lack of a financial motivation meant that virus...
- EpisodeSection 230: The Law that Makes Social Media Great, and TerribleSection 230 is the pivotal law that has enabled the rise of social media -while sparking heated debates over its implications. In this episode, we're charting the history of Section 230, from early...
- EpisodeWhat Happened at Uber?In 2016, Joe Sullivan, former CISO of Facebook, was at the peak of his career. As Uber's new CISO, he and his team had just successfully prevented data from a recent breach from leaking to the internet....
- EpisodeThe Nigerian PrinceIn this episode of ML, we're exploring the history of the well-known Nigerian Prince scam, also known as 419 or advanced fee scam, from its roots in a Parisian prison during the French Revolution, to the...
- EpisodeUnmasking Secrets: The Rise of Open-Source IntelligenceDive into the world of open-source intelligence (OSINT) in this episode, where we uncover how ordinary citizens use publicly available data to unravel some of the most complex global mysteries. From tracking...
- EpisodeThe Source Code of Malicious LifeA few weeks ago we had a listener’s meetup in New York, and as part of that meetup, I gave a talk in which I discussed how Malicious Life came to be - a story that goes back to my days as a ship's captain...
- EpisodeThe Y2K Bug, Part 2In the waning years of the 20th century, amid growing anxieties about the turn of the millennium, one man, Robert Bemer, observed the unfolding drama from his remote home on King Possum Lake. A revered figure...
- EpisodeThe Y2K Bug, Part 1In the 1950s and 60s - even leading into the 1990s - the cost of storage was so high, that using a 2-digit field for dates in a software instead of 4-digits could save an organization between $1.2-$2 Million...
- EpisodeCan You Bomb a Hacker?The 2008 Russo-Georgian War marked a turning point: the first time cyberattacks were used alongside traditional warfare. But what happens when the attackers aren't soldiers, but ordinary citizens? This e...
- EpisodeKevin Mitnick, Part 2In 1991, Kevin Mitnick was bouncing back from what was probably the lowest point of his life. He began to rebuild his life: he started working out and lost a hundred pounds, and most importantly - he was...
- EpisodeKevin Mitnick, Part 1For Kevin Mitnick - perhaps the greatest social engineer who ever lived - hacking was an obsession: even though it ruined his marriage, landed him in scary correction facilities and almost cost him his sanity...
- EpisodeSIM Registration: Security, or Surveillance?Right now, hundreds of thousands of people in the southern African country of Namibia are faced with a choice. At the end of next month, their phone service is going to be shut off permanently: to prevent...
- EpisodeThe Mariposa BotnetIn 2008, The 12 million PCs strong Mariposa Botnet infected almost half of Furture 100 companey - but the three men who ran it were basiclly script kiddies who didn't even knew how to code.Advertising...
- EpisodeThe Real Story of Citibank’s $10M HackValdimir Levin is often presented as "the first online bank robber," and appeares on many lists of the "Top 10 Greatest Hackers." But a few veteran Russian hackers cliam that Levin's...
- EpisodeHow to Hack Into SatellitesAbout a year ago, six academics from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security set out to survey engineers and developers on the subject of satellite cybersecurity. But...
- EpisodeMoonlight MazeWhen investigators discovered in 1996 that US military networks were being extensively hacked, they didn't realize they were witnessing the birth of what would become Russia's formidable Turla APT...
- EpisodeVolt TyphoonIn August 2021, a port in Houston, Texas, was attacked. Over the following months, a series of attacks occurred in various locations, reminiscent of a serial killer's pattern. Targets included...
- EpisodeIs NSO Evil? Part 2By the time Forbidden Stories published its “Pegasus Project” in 2021, NSO was already knee deep in what was probably the worst PR disaster ever suffered by a cybersecurity company - and then, in November...
- EpisodeIs NSO Evil? Part 1NSO Group, creator of the infamous Pegasus spyware, is widely regarded as a vile, immoral company: a sort of 21st century soldier of fortune, a mercenary in the service of corrupt and evil regimes. Yet among...
- EpisodeShould You Pay Ransomware Attackers? A Game Theory ApproachThe FBI explicitly advises companies against paying ransomware attackers - but itself payed 4.4 million dollars worth of Bitcoin after the Colonial Pipeline attack. So, should you listen to what the experts...
- EpisodeSilent Firewalls: The Underrepresentation of Women in CyberIn the vast landscape of STEM, women constitute a mere 28% of the workforce. Yet, when we zoom into the realm of cybersecurity, the number dwindles even further to a startling 20 to 24 percent. What are the...
- EpisodeOperation KudoIn 1981, during the G7 Summit in Quebec, French president Francois Mitterand handen President Raegan a top secret collection of documents, called "Farewell Dossier." The information found in the...
- EpisodeCan We Stop the AI Cyber Threat?Much of the cybersecurity software in use today utilizes AI, especially things like spam filters and network traffic monitors. But will all those tools be enough to stop the proliferation of malware that will...
- EpisodeIs Generative AI Dangerous?Every so often, the entire landscape of cybersecurity shifts, all at once: The latest seismic shift in the field occurred just last year. So in this episode of Malicious Life we’re going to take a look into...
- EpisodeWhy aren't there more bug bounty programs?On the face of it, there's an obvious economic incentive for both vendors and security researchers to collaborate on disclosing vulnerabilities safely and privately. Yet bug bounty programs have gained...
- EpisodeRoman Seleznev: Did the Punishment Fit the Crime?In 2019, Roman Seleznev, a 34 years-old Russian national, was sentenced to 27 years in prison: A sentence that’d make any criminal quiver. Seleznev's deeds had a horrendous effect on the 2.9 million...
- EpisodeSony BMG's Rootkit Fiasco"We made a mistake and Sony paid a terrible price.” A terrible price indeed: an arrogant and ill-advised decision to include a rootkit in its music CDs cost Sony BMG a lot of money - and painted it as a...
- EpisodeAd Fraud, Part 2In the last episode of our show, we heard the story of Methbot: an army of hundreds of thousands of bots, programmatically viewing thousands of advertisements on thousands of made-up websites in order to...
- EpisodeAd Fraud, Part 1Right now, a man named Aleksandr Zhukov is sitting in jail for one of the most financially ruinous schemes ever invented for the internet. Zhukov is guilty. He was caught and convicted under a mountain of...
- EpisodeThe Economics Of CybersecurityThe numbers can’t be any clearer: a DDoS attack costs less than a hundred dollars, while the price tag for mitigating it might reach tens if not hundreds of thousands of dollars. A single well crafted...
- EpisodeThe Reason You Don’t Have Data PrivacyWe’ve all experienced the creepiness of modern data trafficking, but that kind of daily annoyance is the surface of a much bigger issue: Big Tech companies such as Amazon & Microsoft are lobbying...
- EpisodeHow Entire Countries Can Lose the InternetDisruptions to the world’s internet cables happen more often than you think: Whether it be ship anchors or animals or saboteurs, cut a few wires in the right places and at nearly the speed of light you can...
- EpisodeOlympic DestroyerIn the midst of 35,000 exhilarated spectators eagerly chanting the time-honored countdown to kick off the 2018 Pyeongchang Winter Olympics, a sinister malware crept through the games' network, threatening...
- EpisodeThe Lawerence Berkeley Hack, Part 2Oמ May 23rd, 1989, Karl Koch - a 23 years old West German hacker who worked for the KGB - took a drive, from which he would never return: Nine days later his charred remains were found by the police in a...
- EpisodeThe Lawerence Berkeley Hack, Part 1Four decades ago, three quarters would’ve gone a lot further than they do today. With that kind of loose change you could’ve picked up some milk from the grocery store, or over half a gallon of gas, or a bus...
- EpisodeRussian Propaganda, Explained [ML B-Side]You may have heard of the cyber operations performed by Russia. You definitely heard about the missiles being fired by Russia at Ukraine - but how about the propaganda being distributed through the different...
- EpisodeOperation Ivy BellsIn the early 1970's, US intelligance pointed at the possibility that the Russians have laid an underwater communication cable between two important naval bases in the Far East. The dangerous mission of...
- EpisodeWhy Do NFTs Disappear? [ML BSide]What happens when an NFT marketplace goes under, and disappears? You would imagine that the users’ NFTs are perfectly safe: after all, the blockchain itself is still there, right? But that’s not how things...
- EpisodeThe (Other) Problem with NFTsPhysical artworks in museums are usually well-guarded - but digital artworks are something else entirely: in 2021 alone, scammers successfully stole 100 million dollars worth of non-fungible tokens, or NFTs....
- EpisodeSIM Swapping Follow Up [ML B-Side]SIM Swapping Follow Up [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeYou Should Be Afraid of SIM SwapsYou Should Be Afraid of SIM SwapsAdvertising Inquiries: https://redcircle.com/brands
- EpisodeFBI vs. REvil [ML BSide]FBI vs. REvil [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeCyberbunker, Part 2Cyberbunker, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeCyberbunker, Part 1Cyberbunker, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeHow Netflix Learned Cloud SecurityHow Netflix Learned Cloud SecurityAdvertising Inquiries: https://redcircle.com/brands
- EpisodeFred Cohen: The Godfather of Computer Viruses [ML B-Side]Fred Cohen: The Godfather of Computer Viruses [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeThamar ReservoirThamar Gindin is an Israeli scholar whose research focuses on the Persian language. For the past seven years (at least) Thamar has been a target for an endless stream of spear-phishing attempts by the Iranian...
- EpisodeThe Problem With Kernel-Mode Anti-Cheat SoftwareThe Problem With Kernel-Mode Anti-Cheat SoftwareAdvertising Inquiries: https://redcircle.com/brands
- EpisodeNorse Corp.: How To NOT build a cybersecurity startupNorse Corp.: How To NOT build a cybersecurity startupAdvertising Inquiries: https://redcircle.com/brands
- EpisodeJailbreaking Tractors [ML BSide]Jailbreaking Tractors [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Russian Business NetworkThe Russian Business NetworkAdvertising Inquiries: https://redcircle.com/brands
- EpisodeWhat can Chess grandmasters teach us about Cyber? [ML BSide]What can Chess grandmasters teach us about Cyber? [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeLabMD Vs. The FTCLabMD Vs. The FTCAdvertising Inquiries: https://redcircle.com/brands
- EpisodeWhat Would Happen if CBS Got Hacked? [ML BSide]What Would Happen if CBS Got Hacked? [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeHacking Stock Markets, Part 2Hacking Stock Markets, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeVishing: Voice Scams [ML BSide]Vishing: Voice Scams [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeHacking Stock Markets, Part 1Hacking Stock Markets, Part 1Advertising Inquiries: https://redcircle.com/brands
- Episode"King Kimble": Kim DotComThe US government says that Kim Schmitz, better know as Kim DotCom, is the leader of a file sharing crime ring. He sees himself as a an internet freedom fighter: a fugitive on the run from vindictive...
- EpisodeHacking Multi-Factor AuthenticationMulti-Factor Authentication (MFA) is usually considered a better solution for authentication than just using passwords. But Roger Grimes, a veteran security professional, and a Data-Driven Defense Evangelist...
- EpisodeHacking Language ModelsLanguage models are everywhere today: they run in the background of Google Translate and other translation tools; they help operate voice assistants like Alexa or Siri; and most interestingly, they are...
- EpisodeSoftware Bill of Materials (SBOMs) [ML BSide]Software Bill of Materials (SBOMs) [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeLeo Kuvayev– The Czar of SpammersCriminals, particularly cyber criminals, aren’t “good” people; in most cases, they do have their own personal boundaries. Every once in a while, you encounter a criminal who’s different. Someone who seems not...
- Episode"A CISO's Nightmare": Israel Baron on Railway Secuirty"A CISO's Nightmare": Israel Baron on Railway SecuirtyAdvertising Inquiries: https://redcircle.com/brands
- Episode“Designed by criminals, for criminals”: Operation Trojan Shield“Designed by criminals, for criminals”: Operation Trojan ShieldAdvertising Inquiries: https://redcircle.com/brands
- EpisodeAndrew Ginter: A 40-Years-Old Backdoor [ML-BSide]Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeSilk Road, The Amazon of Drugs - Part 2Silk Road, The Amazon of Drugs - Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeKurtis Minder: Ransomware Negotiations [ML BSide]Kurtis Minder: Ransomware Negotiations [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeSilk Road: The Amazon of drugs, Part 1Silk Road: The Amazon of drugs, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeJacob Goldstein: The Future of BitCoin [ML BSide]Jacob Goldstein: The Future of BitCoin [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe “Cypherpunks” Who Invented Private Digital MoneyThe “Cypherpunks” Who Invented Private Digital MoneyAdvertising Inquiries: https://redcircle.com/brands
- EpisodeMalicious LIVE: Celebrating 5 Years of Malicious LifeMalicious LIVE: Celebrating 5 Years of Malicious LifeAdvertising Inquiries: https://redcircle.com/brands
- EpisodeHackers vs. Spies: The Stratfor Leaks, Pt. 2Hackers vs. Spies: The Stratfor Leaks, Pt. 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeHackers vs. Spies: The Stratfor Leaks, Pt. 1Hackers vs. Spies: The Stratfor Leaks, Pt. 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeCatching A Cybercriminal [ML B-Side]Catching A Cybercriminal [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeWhat The LinkedIn Hack Taught Us About Storing PasswordsWhat The LinkedIn Hack Taught Us About Storing PasswordsAdvertising Inquiries: https://redcircle.com/brands
- EpisodeOperation CuckooBees [ML B-Side]Operation CuckooBees [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeHow to Russia-Proof Your Democracy [ML BSide]How to Russia-Proof Your Democracy [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeOp. Sundevil And The Birth of the EFFOp. Sundevil And The Birth of the EFFAdvertising Inquiries: https://redcircle.com/brands
- EpisodeMITRE Attack Flow [ML B-Sides]MITRE Attack Flow [ML B-Sides]Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Russia-Ukraine Cyberwar [ML B-Side]The Russia-Ukraine Cyberwar [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeChris Roberts: Hackers on a PlaneChris Roberts: Hackers on a PlaneAdvertising Inquiries: https://redcircle.com/brands
- EpisodeShould The U.S. Ban Chinese and Russian Technology?Should The U.S. Ban Chinese and Russian Technology?Advertising Inquiries: https://redcircle.com/brands
- EpisodeJack Rhysider, Darknet Diaries [ML B-Side]Jack Rhysider, Darknet Diaries [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Tesla HackThe Tesla HackAdvertising Inquiries: https://redcircle.com/brands
- EpisodeUnderstanding China [ML B-Side]Understanding China [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeRSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeDeadRinger [ML B-Side]DeadRinger [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe JesterThe JesterAdvertising Inquiries: https://redcircle.com/brands
- EpisodeThe State of Credit Card Security [ML B-Side]The State of Credit Card Security [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeAlbert Gonzalez, Part 3Albert Gonzalez, Part 3Advertising Inquiries: https://redcircle.com/brands
- EpisodeDerbyCon - Dave Kennedy [ML B-Side]DerbyCon - Dave Kennedy [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeAlbert Gonzalez, Part 2Albert Gonzalez, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeJeff Moss: DEF CON [ML B-Side]Jeff Moss: DEF CON [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeAlbert Gonzales, Part 1Albert Gonzales, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeTHOTCON Hacking Conference [ML BSide]THOTCON Hacking Conference [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeChina's Unrestricted Warfare, Part 3China's Unrestricted Warfare, Part 3Advertising Inquiries: https://redcircle.com/brands
- EpisodeColonial Pipeline & DarkSide: Assaf Dahan [B-Side]Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeRSA Breach, Part 2RSA Breach, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeRSA Breach: The Untold Story, Part 1RSA Breach: The Untold Story, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeChina's Unrestricted Warfare, Part 2China's Unrestricted Warfare, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeCreating a Grassroots Security Conference: Jack Daniel [ML B-Side]Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeChina's Unrestricted Warfare, Part 1China's Unrestricted Warfare, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeCan Nuclear Power Plants Be Hacked?Can Nuclear Power Plants Be Hacked?Advertising Inquiries: https://redcircle.com/brands
- EpisodeShutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeL0pht, Part 2L0pht, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Story of 'L0pht', Part 1The Story of 'L0pht', Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeMS Exchange Hack [ML B-Side]MS Exchange Hack [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeNotPetya Part 2When the NotPetya pandemic hit, Cyber Analyst Amit Serper was sitting in his parents' living room, getting ready to go out with a few friends. He didn't have most of his tools with him, but he...
- EpisodeShould Law Enforcement Use Facial Recognition? Pt. 1Should Law Enforcement Use Facial Recognition? Pt. 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeClearview AIClearview AIAdvertising Inquiries: https://redcircle.com/brands
- EpisodeBreaking Into BuildingsBreaking Into Buildings Advertising Inquiries: https://redcircle.com/brands
- EpisodeSpecial: The Solarwinds HackSpecial: The Solarwinds HackAdvertising Inquiries: https://redcircle.com/brands
- Episode100th Episode SpecialBest Stories You MissedAdvertising Inquiries: https://redcircle.com/brands
- EpisodeJan Sloot's Incredible Digital Coding SystemJan Sloot's Incredible Digital Coding SystemAdvertising Inquiries: https://redcircle.com/brands
- EpisodeOp. GUNMAN & The World's First KeyloggerOp. GUNMAN & The World's First KeyloggerAdvertising Inquiries: https://redcircle.com/brands
- EpisodeElection Hacking, Part 2Election Hacking, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeElection Hacking, Part 1Election Hacking, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeMDR Vs. The TrickBot GangMDR Vs. The TrickBot GangAdvertising Inquiries: https://redcircle.com/brands
- EpisodeYahoo's Ugly Death, Part 2Yahoo's Ugly Death, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeYahoo's Ugly Death, Part 1Yahoo's Ugly Death, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Great Firewall of China, Pt. 2: Cisco's TrialThe Great Firewall of China, Pt. 2: Cisco's TrialAdvertising Inquiries: https://redcircle.com/brands
- EpisodeThe Great Firewall of China - Part 1The Great Firewall of China - Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeTroy Hunt - InterviewTroy Hunt - InterviewAdvertising Inquiries: https://redcircle.com/brands
- EpisodeMulti-Stage Ransomware (Live)Multi-Stage Ransomware (Live)Advertising Inquiries: https://redcircle.com/brands
- EpisodeProtecting The Panama Papers WhistleblowerProtecting The Panama Papers WhistleblowerAdvertising Inquiries: https://redcircle.com/brands
- EpisodeFrom Ransomware To Blackmail, With Assaf DahanFrom Ransomware To Blackmail, With Assaf DahanAdvertising Inquiries: https://redcircle.com/brands
- EpisodeSegWit2x, Part 3SegWit2x, Part 3Advertising Inquiries: https://redcircle.com/brands
- EpisodeSegWit2x Part 2SegWit2x Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeHacking Fortnite Accounts (CPRadio)Hacking Fortnite Accounts (CPRadio)Advertising Inquiries: https://redcircle.com/brands
- EpisodeSegWit2x, or - The Year Bitcoiners Will Never Forget, Part 1SegWit2x, or - The Year Bitcoiners Will Never ForgetAdvertising Inquiries: https://redcircle.com/brands
- EpisodeNo Honor Among ThievesNo Honor Among ThievesAdvertising Inquiries: https://redcircle.com/brands
- EpisodeMaintaining Secure Business Continuity With A Remote Workforce - With Sam CurryMaintaining Secure Business Continuity With A Remote Workforce - With Sam CurryAdvertising Inquiries: https://redcircle.com/brands
- EpisodeThe Problem With PasswordsThe Problem With PasswordsAdvertising Inquiries: https://redcircle.com/brands
- EpisodeSteven Wozniak Interview, Deep 2017Steven Wozniak Interview, Deep 2017Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Hauwei Ban, Part 2The Hauwei Ban, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeToTok, Part 1: How to Convince Someone to Download SpywareToTok, Part 1: How to Convince Someone to Download SpywareAdvertising Inquiries: https://redcircle.com/brands
- EpisodeHow To Defend A Bank, Pt. II: Right of BangHow To Defend A Bank, Pt. II: Right of BangAdvertising Inquiries: https://redcircle.com/brands
- EpisodeHow To Defend A Bank, Part 1: Fusion CentersHow To Defend A Bank, Part 1: Fusion CentersAdvertising Inquiries: https://redcircle.com/brands
- EpisodeTriton, Part 2: The World’s Most Dangerous MalwareTriton, Part 2: The World’s Most Dangerous MalwareAdvertising Inquiries: https://redcircle.com/brands
- EpisodeTriton Part 1Triton Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeDeep Fakes, Part 2: Man Vs. MachineDeep Fakes are set to revolutionize content creation, but alongside this technology's benefits, it also has the potential two sow havoc, fear, and distrust via Social Networks. Just this week, Facebook...
- EpisodeGAN and Deep Fakes, Part 1Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and Trump deliver speeches they never gave, Gal Gadot "stars” in a porn video, and...
- EpisodeSam Curry: The 2020 Crystal BallSam Curry: The 2020 Crystal BallAdvertising Inquiries: https://redcircle.com/brands
- EpisodeHuman Side ChannelsHuman Side ChannelsAdvertising Inquiries: https://redcircle.com/brands
- EpisodeWhat's the problem with Cyber Insurance?Thousands of companies are losing millions of dollars to cyber attacks. An insurance seems an ideal solution to their woes - yet this kind of insurance is much less common today, than it should be. What's...
- EpisodeGozi B-Side: Amit Serper & Sam CurryNate Nelson speaks with Amit Serper & Sam Curry, notable veteran in Cyber Security, about Malware-As-A-Service, bullet-proof hosting, avoiding the lure of the 'dark side' and more.Advertising...
- EpisodeGozi Part 2In 2010, Nikita Kuzmin returned to the malware scene with Gozi 2.0, an improved version of the successful banking Trojan. How did Gozi 2.0 fair against Zeus & the new generation of Trojans, and what can...
- EpisodeEP61: Prying EyesRoughly 600,000 laptops are lost every year in US airports alone: some reports say a laptop is stolen every minute. How hard is it to hack into a stolen laptop? "Hackable?", McAfee's Cyber...
- EpisodeEP60: ML B-Side: Lodrian Cherne On StalkerwareIn this out-of-band episode, we're bringing you the full interview with Lodrina Cherne, a Digital Forensics Expert, on Spyware : what is it, how it works, who sells it, and how you can avoid it...
- EpisodeEP59: Gozi, Part 1: The Rise of Malware-as-a-ServiceNikita Kuzmin could have been a whiz programmer or a CEO of a successful startup. But as a teen in Moscow, he fell in with the wrong crowd, and his entrepreneurial skills found a different path: Gozi, the...
- EpisodeEP58: How is Spyware Legal?Today's Cyber Stalkers have free access to almost government-grade spyware software with which they can terrorize their victims. Who's enabling the commercial spyware market? Advertising Inquiries:...
- EpisodeEP57: Listeners Survey SpecialRan and Eliad Kimhy, one of the show's top producers, discuss the recent Listener's Survey results: what do like and dislike about the show, ideas you gave us for future improvements - and what do our...
- EpisodeEP56: Operation Aurora, Part 2Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his own name -...
- EpisodeEP55: Operation Aurora, Part 1In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and often...
- EpisodeResponding to a Cyber Attack with MissilesShould governments responde to cyber attack with deadly force? Senior researcher Mikko Hypponen and Prof. Itzik Ben Israel (Ret. General, IDF R&D) discuss this sensative question.Advertising Inquiries:...
- EpisodeEP53: Are Ad Blockers Malicious?Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by some blockers...
- EpisodeML_ConfickerCan a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure. Advertising Inquiries:...
- EpisodeOperation SoftCellA rare, inside look, at how Cybereason's researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the...
- Episode'Pa Bell' Vs. Youth International Party LineThe YIPL phreaking magazine was the spiritual predecessor to the better-known '2600' zine, and it was founded by a ideological party determined to bring down the largest monopoly in US history: Bell...
- EpisodeThe U.S vs. Gary McKinnonAfter the Challenger Disaster of 1986, NASA had a hard time convincing the public that the Galileo spacecraft, fueled by radioactive Plutonium, is safe to launch. The WANK worm, it turns out, was a message...
- EpisodeThe WANK Worm, Part 2After the Challenger Disaster of 1986, NASA had a hard time convincing the public that the Galileo spacecraft, fueled by radioactive Plutonium, is safe to launch. The WANK worm, it turns out, was a message...
- EpisodeThe WANK Worm, Part 1On October 16th, 1989, NASA's scientists went into work preparing to launch a spacecraft that very day. But when they sat down to their computers, they were met with an unexpected greeting: “Your system...
- EpisodeThe Equifax Data Breach Pt. II: The Bits Hit The FanAfter its momentous breach, Equifax's CEO Richard Smith said: “Equifax will not be defined by this incident, but rather by how we respond.” Well, he was spot on, but not in a good way. The post The...
- EpisodeThe Equifax Data Breach Pt. I: A Big Data BubbleIn their 120 year history, Equifax never sold anything, or provided any service to ordinary folks - except collect DATA. In 2017, that huge data repository, a 1000 times larger then the Library of Congress,...
- EpisodeDeCSS: Hackers Vs HollywoodTwenty years ago, a 15-years old Norwegian kid was put on trial for breaking the DVD Copy Prevention system. His case spawned a whole new "artistic" movement... The post DeCSS: Hackers Vs Hollywood...
- EpisodeMarconi & The Maskelyne AffairGuglielmo Marconi--the beloved, hated, disputed inventor of radio--gets trolled by a mustached magician in the world’s first ever, wireless, grey hat hack. The post Marconi & The Maskelyne Affair appeared...
- EpisodeThe Fall Of Mt. Gox – Part 2In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside. The post The Fall Of...
- EpisodeThe Location Data Brokers – A CYBER Podcast SpecialCYBER is a new podcast from Motherboard, a very well known and respected technology blog and online magazine. The episode you’ll hear shortly is about the shady market of data aggregators and brokers who sell...
- EpisodeThe Fall Of Mt. Gox – Part 1In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside. The post The Fall Of...
- EpisodeBlack Duck Eggs: Darknet DiariesThis week we're doing an episode swap with the excellent podcast Darknet Diaries. A former NSA agent who has gone off to be a security consultant, tells a story about an assignment that he'll never...
- EpisodeDave Kennedy: The Psychological Principles of Social EngineeringToday on Malicious Life, tens of thousands of people get robbed. Then a community gets together to ask: should we take our money back, or let the hacker walk with it? The post Dave Kennedy: The Psychological...
- EpisodeThe Ethereum DAO HackToday on Malicious Life, tens of thousands of people get robbed. Then a community gets together to ask: should we take our money back, or let the hacker walk with it? The post The Ethereum DAO Hack appeared...
- EpisodeThe Jerusalem Virus, Part 2How did the Jerusalem virus trigger the birth of the entire Anti Virus industry in Israel? A high-stakes wager on Live TV, and more. The post The Jerusalem Virus, Part 2 appeared first on Malicious...
- EpisodeThe Jerusalem Virus, Part 1Although scary, the Jerusalem virus, discovered in Israel in 1987, was in fact a rather simple virus. How, then, did the virus trigger the birth of an entire national industry? The post The Jerusalem Virus,...
- EpisodeGene Spafford on the Morris Worm & Cyber-security in the 1980’sEugene Spafford (aka Spaf), a professor of computer science at Purdue University, was the first researcher to publish a detailed analysis of the infamous Morris Worm. Gene talks to Ran about this incident, as...
- EpisodeChina Vs. GithubIt’s a weapon that harnessed the strength of millions of computers at once: a cannon so powerful it could break through any wall, take down any website. It is “the Great Cannon”. The post China Vs. Github...
- EpisodeThe Ashley Madison Hack, Part 2On the second installment of our Ashely Madison hack retelling, we look at the fallout of one of the hack, and the people who’ve suffered from it. The post The Ashley Madison Hack, Part 2 appeared first on...
- EpisodeThe Ashley Madison Hack, Part 1When Ashley Madison got hacked, it made international headlines. Why? Because it wasn’t just a major event. It demonstrated how there’s information even more sensitive, even more significant than your credit...
- EpisodeInterview Special: Graham CluleyAs we prepare to release an awesome 2-part story in two weeks, we decided to give you a chance to go back to some old favorites and check out some of the behind-the-scenes interviews of Malicious Life. Graham...
- EpisodeThe Target HackIf movies have taught me anything, it’s that if you want to rob a bank, you dress as the cleaning crew. The people behind the Target hack must have seen one action film too many, because when they decided to...
- EpisodeWoW: Corrupted BloodHow does the outbreak of a “plague” inside a video game- a bug, essentially- affect real-life disease research? The post WoW: Corrupted Blood appeared first on Malicious Life.Advertising Inquiries:...
- EpisodeThe Stuxnet Virus Pt. 3Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of the modern...
- EpisodeThe Stuxnet Virus Pt. 2Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way to its...
- EpisodeThe Stuxnet Virus Pt. 1Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever. Dubbed...
- EpisodeShamoon – The Biggest Hack In HistoryThe Shammon Virus. There is a single company, run by a royal family, which employs the majority of the Saudi working population. It’s worth more than Apple, Google, and Amazon…by a lot. The Saudi Aramco oil...
- EpisodeThe Melissa VirusNot all malware is created equal. Some malware will attempt to erase your files, demand ransom, or steal your information. Others will do no such thing- and still end up being worse. Don’t believe us? What if...
- EpisodeGhostNetA young woman is arrested by the Chinese government while trying to cross the border to Tibet. Her interrogator, a Chinese spy, pulls out a dossier full of information regarding her activity online. It turns...
- EpisodeThe Morris Worm Pt. 2In an attempt to halt the Morris worm’s path of destruction, a systems administrator at Harvard shut down the university router through which Andy Sudduth’s message would be sent to the internet. The post...
- EpisodeThe Morris Worm Pt. 1We’ve introduced you to some of the seminal malware attacks that have shaped cybersecurity history. Perhaps no other incident in history, though, has had the effect on how we think about computer security...
- EpisodeThe Half Life 2 HackHow far should a die-hard fan go, in order to bring closer to them the thing that they love? In one of the most interesting, yet relatively unknown cybersecurity stories, a young hacker attempts to steal his...
- EpisodeThe Legalities of the Cyber WarCatching a criminal is by no means easy, but there’s something we take for granted in any crime: that the criminal has a face and a name, that they used a specific weapon on a specific target, and that the...
- EpisodeFancy Bear, Cozy BearWhen representatives from the Democratic National Committee reached out to a silicon valley cybersecurity company, to investigate a potential breach in their computer system, it’s hard to imagine what they...
- EpisodeHack BackThose who have experienced a cybercrime know the feelings of frustration and helplessness that come along with it. A hacker could be halfway across the world when they attack you, and you might have no way of...
- EpisodeCyber TerrorismWhat governments and powerful organizations regularly use, others will find ways to use as well. Cyber activity fits so incredibly well with terrorism. Actors can remain hidden, or reveal themselves to the...
- EpisodeSuper SpiesThe NSA has many means at its disposal. But how does it use these means, and for what goals? Discover the (literally) secret history of the NSA’s cyber activity. Travel with us to Russia and back, learn the...
- EpisodeThe Trojan Horse AffairThe early 2000s were an interesting time in Information Security. This is roughly the period when malware transitioned from viruses written by teenagers for fun, to cybercrime tools in the hands of...
- EpisodeAmit Serper Interview- Holiday Special EpisodeIt’s the holidays and everyone’s on vacation – but the Internet never rests and neither do the bad guys in cybersecurity. So, for this holiday special, we figured we’ll air an interesting interview we did a...
- EpisodeWeapons of Mass DisruptionThe threat of fire and fury stands at the center of all modern conflicts- nuclear bombs that can eradicate life in seconds are the ultimate weapon of war, as they pose a huge threat to centers of population....
- EpisodeThe Soldiers of North KoreaGuerrilla warfare has been around for as long as conventional warfare has. The idea that a small force, through cunning and brazen action, could overtake a larger force is an old one. From pirates who would...
- EpisodeThe PropagandaGovernments around the world have been making devious use of the internet as a platform to spread, not malware, but propaganda. As in all wars, propaganda is a huge part of the modern cyber war. Join us as we...
- EpisodeThe WhistleblowersWikiLeaks has ushered in a new age in whistle blowing: Modern leakers such as Chelsea Manning – who’s story is the focus of our current episode – expose huge amounts of confidential information. But can these...
- EpisodeStuxnet, part 3Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of the modern...
- EpisodeStuxnet, part 2Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way to its...
- EpisodeStuxnet, part 1Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever. Dubbed...
- EpisodeHell to PayA global FBI manhunt for the world’s most wanted cyber criminal ends in the capture of a massive criminal network, but with the escape of the man himself. Security experts who operate within the gray areas of...
- EpisodeThe Roots of EvilWannaCry’s widespread cyber attack on more than 200,000 computers all over the world made headlines – but only a few people remember a similar attack, named The AIDS Trojan, almost 30 years earlier… In this...
- EpisodeBig Cannons2016 is known throughout the circles of information security as “The Year of The DDoS Attacks”, and rightfully so: 5 large scale DDoS attacks – ‘Distributed Denial Of Service’ – shocked the technology world....
- EpisodeSpam EmpireIn this episode of Malicious Life, we take a look at one of the oldest forms of criminal activity on the web- the spam empires of the 90’s and 2000’s. Find out how these multi-million dollar industries...
- EpisodeThe Dark AvengerIn 1989, a message was found in a virus: “Eddie Lives…Somewhere in Time!”. ‘Eddie’ was a particularly nasty virus, and its discovery led a young Bulgarian security researcher down a rabbit hole, on a hunt for...
- EpisodeGhost In The MachineCybercrime is one of the most notable threats we face as computer users, nowadays. But it wasn’t always so. Those of us who’ve been in the field long enough may remember a time when computer viruses were much...