DiscoverMalicious Life
Malicious Life

Malicious Life

Author: Malicious Life

Subscribed: 10,166Played: 172,571
Share

Description

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.
72 Episodes
Reverse
Banks & other financial institutions face a variety of security threats: from state-sponsored cyber-attacks, to smaller acts of fraud, to thousands of random malware attacks from the web. To survive in this hostile landscape, these organizations turned to the military for inspiration. The post How To Defend A Bank, Part 1: Fusion Centers appeared first on Malicious Life.
Petro Rabigh were facing lots of problems in defending their systems. But they did get lucky in one sense: their hackers were unprepared when their plan went awry. Who were the hackers that infiltrated the Saudi petrochemical plant, and what can this breach teach us? The post Triton, Part 2: The World’s Most Dangerous Malware appeared first on Malicious Life.
Industrial Security requires a different skill set--really, an entirely different mindset than working in IT does. In this episode we dive into the story of one of the most dangerous malware ever to be discovered in the wild: Triton/Trisis. The post Triton: A Malware Designed To Kill Humans, Part 1 appeared first on Malicious Life.
Deep Fakes are set to revolutionize content creation, but alongside this technology's benefits, it also has the potential two sow havoc, fear, and distrust via Social Networks. Just this week, Facebook disclosed a network of fake users it found, whose profile images were all deep faked. So, how can we identify deep fakes - even before they go online? The post Deep Fakes, Part 2: Man Vs. Machine appeared first on Malicious Life.
GAN and Deep Fakes, Part 1

GAN and Deep Fakes, Part 1

2019-12-1900:43:184

Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and Trump deliver speeches they never gave, Gal Gadot "stars” in a porn video, and professional comedians such as Bill Hader eerily turn into the people they impersonate, like Tom Cruise and Arnold Schwarzenegger. What all of these videos have in common is that they were mostly created by amateur developers or small startups with tight budgets - but their quality is surprisingly good, and in some cases as good as what the biggest movie studios were able to produce with huge budgets just a few years ago. So what happened in the last five years, that turned special effects from being the exclusive domain of industry experts - into something a 14-year-old can create more or less at the touch of a button? Like the top end of a floating glacier, Deep Fakes are by and large only the visible product of a fascinating - and much deeper - technological revolution in the field of artificial intelligence. As we shall soon see, this revolution has the potential to put some very powerful tools in the hands of both attackers and defenders in the world of cyber-security. The post GAN and Deep Fakes, Part 1 appeared first on Malicious Life.
Sam Curry is Cybereason's Chief Security Officer and an award-winning cyber security visionary. Sam & Ran discuss Sam's upcoming webinar, in which he will present his insights into what 2020 will bring for the security industry: the rise of 5G cellular networks, The US Presidential Elections, the 2020 Tokyo Olympics and more. The post Sam Curry: The 2020 Crystal Ball appeared first on Malicious Life.
Human Side Channels

Human Side Channels

2019-12-0500:33:394

Even the best hackers are human, and humans are inescapably unique. Forensic Linguistics, Behavioral Signatures and Cultural Captchas can help defenders identify and (maybe) catch even the best of hackers. The post Human Side Channels appeared first on Malicious Life.
Thousands of companies are losing millions of dollars to cyber attacks. An insurance seems an ideal solution to their woes - yet this kind of insurance is much less common today, than it should be. What's the problem with Cyber insurance? The post What’s the problem with Cyber Insurance? appeared first on Malicious Life.
Nate Nelson speaks with Amit Serper & Sam Curry, notable veteran in Cyber Security, about Malware-As-A-Service, bullet-proof hosting, avoiding the lure of the 'dark side' and more. The post Gozi B-Side: Amit Serper & Sam Curry appeared first on Malicious Life.
Gozi, Part 2

Gozi, Part 2

2019-11-1400:35:313

In 2010, Nikita Kuzmin returned to the malware scene with Gozi 2.0, an improved version of the successful banking Trojan. How did Gozi 2.0 fair against Zeus & the new generation of Trojans, and what can we learn from Nikita's story about how does one become a malicious hacker in the first place? The post Gozi, Part 2 appeared first on Malicious Life.
In this out-of-band episode, we're bringing you the full interview with Lodrina Cherne, a Digital Forensics Expert, on Spyware : what is it, how it works, who sells it, and how you can avoid it yourself. The post B-Side: Lodrina Cherne On Stalkerware appeared first on Malicious Life.
Nikita Kuzmin could have been a whiz programmer or a CEO of a successful startup. But as a teen in Moscow, he fell in with the wrong crowd, and his entrepreneurial skills found a different path: Gozi, the oddest and most brilliant malware operation ever conceived to that point in time. The post Gozi, Part 1: The Rise of Malware-as-a-Service appeared first on Malicious Life.
How is Spyware Legal?

How is Spyware Legal?

2019-10-1700:41:302

Today's Cyber Stalkers have free access to almost government-grade spyware software with which they can terrorize their victims. Who's enabling the commercial spyware market? The post How is Spyware Legal? appeared first on Malicious Life.
Listeners Survey Special

Listeners Survey Special

2019-10-1000:28:562

Ran and Eliad Kimhi, one of the show's top producers, discuss the recent Listener's Survey results: what do like and dislike about the show, ideas you gave us for future improvements - and what do our listeners think about Ran's accent?... The post Listeners Survey Special appeared first on Malicious Life.
Operation Aurora, Part 2

Operation Aurora, Part 2

2019-09-2600:32:515

Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his own name - and wasn't happy with the search results?... The post Operation Aurora, Part 2 appeared first on Malicious Life.
Operation Aurora, Part 1

Operation Aurora, Part 1

2019-09-1200:34:058

In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and often turbulent relationship between the world's largest internet company, and the world's most populated nation. The post Operation Aurora, Part 1 appeared first on Malicious Life.
Is the use of deadly force a legitimate – and practical – response to cyber attacks? what lessons did Israel learn from the Yom Kippur War of 1973 about the best way to manage it’s offensive cyber units? How can governments ‘signal’ to their opponents their cyber power, without actually deploying cyber weapons? Join us […] The post Responding to a Cyber Attack with Missiles appeared first on Malicious Life.
Are Ad Blockers Malicious?

Are Ad Blockers Malicious?

2019-08-1500:33:213

Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by some blockers present us with a moral dilemma. The post Are Ad Blockers Malicious? appeared first on Malicious Life.
Conficker

Conficker

2019-07-1800:39:074

Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure. The post Conficker appeared first on Malicious Life.
Operation SoftCell

Operation SoftCell

2019-07-0400:34:277

A rare, inside look, at how Cybereason's researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the world. The post Operation SoftCell appeared first on Malicious Life.
loading
Comments (48)

Brooke Venning

this episode was kinda cheesy. the dude hosts a cyber security podcast and in this episode is acting like he has never been around computers. the whole thing was just kinda lame and I usually love this podcast.

Jan 30th
Reply

Henkje

Autorun is default disabled since windows vista. This information is simply completely false. This is why i don't listen to hackable. This is how it actually works: The usb emulates a keyboard and types commands into the computer. You can see this happening, but it is fast (say 4 seconds for a payload that executes executable)

Jan 14th
Reply

Sundos Hammoud

Great podcast! informative, fun and very well-presented. You touch on very interesting topics as well, I'm hooked! Keep it up!

Dec 20th
Reply (1)

M

I didn't get a chance to respond but I just wanna say Ran I adore your accent and manner of speaking, you are a great storyteller and your pronunciations of certain words makes me grin! We all make mistakes and this has never taken away from me enjoying this show!! I But today with Trinidad and Tobago, the Tobago bit is pronounced Tah/Tuh-bay-go. thank yooou everyone who makes this show!

Oct 14th
Reply (2)

M

Haha Ran you are correct with your guess! Stand to the right side of the escalator, walk up on the left!! Those with massives suitcases at rush hour learn this fact quickly!

Sep 26th
Reply (1)

Tahn Costelloe

Great podcast series so far. Enjoying it a lot!

Aug 15th
Reply (1)

Trevor White

looks like the podcast is being promoted on castbox but no episodes show up at all in the episode list??

Aug 12th
Reply (1)

Sony Varghese

Hi... this is a repeat upload. Could you check and upload the correct episode? Thanks.

Jul 18th
Reply (1)

Googlebox

really opens your eyes to the danger of the internet

Jul 5th
Reply

M

can I get a malicious life t-shirt still :O!?

Jun 27th
Reply (3)

Patrick Bornay

as a compsci student the code/cryptography details are very much appreciated

May 23rd
Reply (1)

M

hahah what a hilarious and bizarre ending! entertaining and educating as usual, thank you :)

May 9th
Reply (1)

Spike Robinson

Great podcast. I don't even mind the sponsor ad, because it's really on topic and relevant.

Apr 25th
Reply (1)

JACK SPARROW

man awesome podcast, I have passed this onto every engineer I know

Apr 22nd
Reply (1)

J

This is fantastic. Way to make nerdy things interesting and enjoyable!

Apr 16th
Reply (3)

M

Really informative and fun podcast! It's making me really interested in pursuing web security as a side

Apr 13th
Reply (1)

Michael Bergman

Why aren't the new episodes showing up here? They show up on Google Podcasts.

Apr 10th
Reply (6)

Abhishek Srivastava

This podcast is so entertaining! Love it!

Apr 6th
Reply (1)

Karl Dieseldorff

Very well informed, BUT also sooooo very entertaining! Thank you for all the important work you and your team does! Simply great writing and soundscaping.

Jan 22nd
Reply

Justin Rogers

best blog on the web

Jul 13th
Reply
loading
Download from Google Play
Download from App Store