Malicious Life
Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meet
...more
Technology
The Y2K Bug, Part 2
In the waning years of the 20th century, amid growin...
more
Apr 16 2024 31m
Chapter 1 19 mins
The Y2K DilemmaChapter 2 11 mins
Y2K and Future Computer Glitches
The Y2K Bug, Part 1
In the 1950s and 60s - even leading into the 1990s -...
more
Mar 31 2024 27m
Chapter 1 8 mins
The Millenium Y2K CrisisChapter 2 17 mins
Computer Date Standards and Y2K Concerns
Can You Bomb a Hacker?
The 2008 Russo-Georgian War marked a turning point: ...
more
Mar 19 2024 30m
Chapter 1 15 mins
Cyber Warfare and National SovereigntyChapter 2 15 mins
Regulating Cyber Operations in Armed Conflict
Kevin Mitnick, Part 2
In 1991, Kevin Mitnick was bouncing back from what w...
more
Mar 4 2024 51m
Chapter 1 8 mins
The Rise of Kevin MitnickChapter 2 19 mins
Kevin MitnickChapter 3 11 mins
Kevin MitnickChapter 4 11 mins
Social Engineering and Kevin Mitnick
Kevin Mitnick, Part 1
For Kevin Mitnick - perhaps the greatest social engi...
more
Feb 19 2024 37m
Chapter 1 14 mins
Kevin Mitnick's Hacking EscapadesChapter 2 17 mins
The Dark Journey of Kevin MitnickChapter 3 5 mins
Mitnik's Return to Hacking World
SIM Registration: Security, or Surveillance?
Right now, hundreds of thousands of people in the so...
more
Feb 5 2024 31m
Chapter 1 8 mins
SIM Card Registration Impact in NamibiaChapter 2 13 mins
SIM Card Registration Challenges in NamibiaChapter 3 8 mins
SIM Registration and National Security
The Real Story of Citibank’s $10M Hack
Valdimir Levin is often presented as "the first onli...
more
Jan 9 2024 32m
Chapter 1 19 mins
Vladimir LevinChapter 2 13 mins
Hacking the Citibank Network
How to Hack Into Satellites
About a year ago, six academics from Ruhr University...
more
Dec 27 2023 30m
Chapter 1 14 mins
Satellite Cybersecurity Challenges and RisksChapter 2 4 mins
The Vulnerabilities of Satellite CommunicationChapter 3 11 mins
Satellite Security and Recovery Vulnerabilities
Volt Typhoon
In August 2021, a port in Houston, Texas, was attack...
more
Nov 28 2023 31m
Chapter 1 12 mins
Changing Tactics of Advanced Nation-State HackersChapter 2 19 mins
Living Off the Land Techniques Rise
Is NSO Evil? Part 2
By the time Forbidden Stories published its “Pegasus...
more
Nov 13 2023 40m
Chapter 1 11 mins
The Controversial Role of NSO's PegasusChapter 2 12 mins
NSO's Troubles and DownfallChapter 3 15 mins
NSO's Controversial Spyware and Global Politics
Is NSO Evil? Part 1
NSO Group, creator of the infamous Pegasus spyware, ...
more
Oct 30 2023 32m
Chapter 1 13 mins
NSO's Pegasus SpywareChapter 2 18 mins
NSO's Ethical Implications and Controversies
Should You Pay Ransomware Attackers? A Game Theory Approach
The FBI explicitly advises companies against paying ...
more
Oct 17 2023 32m
Chapter 1 9 mins
The Hypocrisy of Paying Ransomware HackersChapter 2 13 mins
The Complex Decision-Making of Ransomware AttacksChapter 3 8 mins
Solving the Ransomware ProblemChapter 4 42 sec
Podcast Production and Contact Information
Silent Firewalls: The Underrepresentation of Women in Cyber
In the vast landscape of STEM, women constitute a me...
more
Oct 2 2023 29m
Chapter 1 10 mins
Gender Inequality in Cyber SecurityChapter 2 19 mins
Gender Gap in Cybersecurity and STEM
Operation Kudo
In 1981, during the G7 Summit in Quebec, French pres...
more
Sep 20 2023 33m
Chapter 1 17 mins
Espionage and Cold War SecretsChapter 2 11 mins
Operation Kudu
Can We Stop the AI Cyber Threat?
Much of the cybersecurity software in use today util...
more
Sep 4 2023 26m
Chapter 1 16 mins
Protecting Against Malicious AI UsesChapter 2 10 mins
AI in Telemarketing Defense
Is Generative AI Dangerous?
Every so often, the entire landscape of cybersecurit...
more
Aug 22 2023 37m
Chapter 1 17 mins
The Future of CybersecurityChapter 2 19 mins
AI Threats and Manipulative Digital Twins
Why aren't there more bug bounty programs?
On the face of it, there's an obvious economic incen...
more
Aug 8 2023 33m
Chapter 1 13 mins
Vulnerability Disclosure Challenges and IncentivesChapter 2 10 mins
The Impact of Bug Bounty ProgramsChapter 3 10 mins
Vulnerability DisclosuresChapter 4 25 sec
Malaysia's Media Production and Cybersecurity Sponsor
The Voynich Manuscript
The constant battle between those who wish to encryp...
more
Jul 25 2023 29m
Chapter 1 16 mins
The Mysterious Voynich ManuscriptChapter 2 12 mins
The Mystery of the Voynich Manuscript
Roman Seleznev: Did the Punishment Fit the Crime?
In 2019, Roman Seleznev, a 34 years-old Russian nati...
more
Jul 10 2023 38m
Chapter 1 8 mins
Sentencing a Cyber CriminalChapter 2 17 mins
The Rise and Fall of AncoxChapter 3 11 mins
The Conviction of Roman Selesnav
Sony BMG's Rootkit Fiasco
"We made a mistake and Sony paid a terrible price.” ...
more
Jun 27 2023 41m
Chapter 1 13 mins
Sony BMG's Malicious Software ControversyChapter 2 19 mins
Sony's DRM Rootkit ControversyChapter 3 10 mins
Rise and Fall of DRM and Digital Piracy Battle
Ad Fraud, Part 2
In the last episode of our show, we heard the st...
more
Jun 12 2023 28m
Chapter 1 9 mins
The Harsh Reality of Ad FraudChapter 2 17 mins
Ad FraudChapter 3 1 min
Podcast Updates and Superhero Fantasies
Ad Fraud, Part 2
In the last episode of our show, we heard the story ...
more
Jun 9 2023 28m
Chapter 1 9 mins
The Harsh Reality of Ad FraudChapter 2 17 mins
The Reality of Online Advertising FraudChapter 3 1 min
Economics of Cybercrime and Superhero Fantasies
Ad Fraud, Part 1
Right now, a man named Aleksandr Zhukov is sitti...
more
May 30 2023 23m
Chapter 1 14 mins
The Malicious Life of Alexander ZhukovChapter 2 8 mins
The Massive Phenomenon of Ad Fraud