What are your interests?
Select categories to help us recommend content for you.
Let's Go!
Close queue History
Play full episodes to fill your queue.
   
Malicious Life

Malicious Life

411 Episodes By Malicious Life redcircle.com/shows/malicious-li...
Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meet ...more
Technology
Malicious Life
Malicious Life
@maliciouslife
mute button
The Y2K Bug, Part 2
In the waning years of the 20th century, amid growin... more
Apr 16 2024 31m
The Y2K Outsourcing Boom
Like
Clip
Share
Transcript
More
Play Full
mute button
The Y2K Bug, Part 1
In the 1950s and 60s - even leading into the 1990s -... more
Mar 31 2024 27m
Y2K Computer System Transition Story
Like
Clip
Share
Transcript
More
Play Full
mute button
Can You Bomb a Hacker?
The 2008 Russo-Georgian War marked a turning point: ... more
Mar 19 2024 30m
Russian Cyber Attacks
Like
Clip
Share
Transcript
More
Play Full
mute button
Kevin Mitnick, Part 2
In 1991, Kevin Mitnick was bouncing back from what w... more
Mar 4 2024 51m
Cyber Security Interview With Derek Masters
Like
Clip
Share
Transcript
More
Play Full
mute button
Kevin Mitnick, Part 1
For Kevin Mitnick - perhaps the greatest social engi... more
Feb 19 2024 37m
The Legacy of Kevin Mitnick
Like
Clip
Share
Transcript
More
Play Full
mute button
SIM Registration: Security, or Surveillance?
Right now, hundreds of thousands of people in the so... more
Feb 5 2024 31m
SIM Card Registration Policy and Compliance
Like
Clip
Share
Transcript
More
Play Full
mute button
The Mariposa Botnet
In 2008, The 12 million PCs strong Mariposa Botnet i... more
Jan 22 2024 44m
Highlight
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
The Real Story of Citibank’s $10M Hack
Valdimir Levin is often presented as "the first onli... more
Jan 9 2024 32m
Like
Clip
Share
Transcript
More
Play Full
mute button
How to Hack Into Satellites
About a year ago, six academics from Ruhr University... more
Dec 27 2023 30m
Security Flaws Discovered in Satellite Firmware
Like
Clip
Share
Transcript
More
Play Full
mute button
Moonlight Maze
When investigators discovered in 1996 that US milita... more
Dec 11 2023 35m
Cyber Warfare
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Volt Typhoon
In August 2021, a port in Houston, Texas, was attack... more
Nov 28 2023 31m
Like
Clip
Share
Transcript
More
Play Full
mute button
Is NSO Evil? Part 2
By the time Forbidden Stories published its “Pegasus... more
Nov 13 2023 40m
NSO's Pegasus Scandal and Consequences
Like
Clip
Share
Transcript
More
Play Full
mute button
Is NSO Evil? Part 1
NSO Group, creator of the infamous Pegasus spyware, ... more
Oct 30 2023 32m
Founding NSO and Developing Pegasus Spyware
Like
Clip
Share
Transcript
More
Play Full
mute button
Should You Pay Ransomware Attackers? A Game Theory Approach
The FBI explicitly advises companies against paying ... more
Oct 17 2023 32m
Solving Tragedy of the Commons
Like
Clip
Share
Transcript
More
Play Full
mute button
Silent Firewalls: The Underrepresentation of Women in Cyber
In the vast landscape of STEM, women constitute a me... more
Oct 2 2023 29m
Role Models in Cybersecurity
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Operation Kudo
In 1981, during the G7 Summit in Quebec, French pres... more
Sep 20 2023 33m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Can We Stop the AI Cyber Threat?
Much of the cybersecurity software in use today util... more
Sep 4 2023 26m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Is Generative AI Dangerous?
Every so often, the entire landscape of cybersecurit... more
Aug 22 2023 37m
Like
Clip
Share
Transcript
More
Play Full
mute button
Why aren't there more bug bounty programs?
On the face of it, there's an obvious economic incen... more
Aug 8 2023 33m
Bon Ton's Success and Bug Bounties
Like
Clip
Share
Transcript
More
Play Full
mute button
The Voynich Manuscript
The constant battle between those who wish to encryp... more
Jul 25 2023 29m
Unbreakable Ciphers From the 15th Century
Like
Clip
Share
Transcript
More
Play Full
mute button
Roman Seleznev: Did the Punishment Fit the Crime?
In 2019, Roman Seleznev, a 34 years-old Russian nati... more
Jul 10 2023 38m
From School to Cyber Criminal
Like
Clip
Share
Transcript
More
Play Full
mute button
Sony BMG's Rootkit Fiasco
"We made a mistake and Sony paid a terrible price.” ... more
Jun 27 2023 41m
Sony BMW's Costly PR Disaster
Like
Clip
Share
Transcript
More
Play Full
mute button
Ad Fraud, Part 2
In the last episode of our show, we heard the st... more
Jun 12 2023 28m
A Simple Solution to Ad Fraud
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Ad Fraud, Part 2
In the last episode of our show, we heard the story ... more
Jun 9 2023 28m
Like
Clip
Share
Transcript
More
Play Full
mute button
Ad Fraud, Part 1
Right now, a man named Aleksandr Zhukov is sitti... more
May 30 2023 23m
Hunting Ad Fraud Cyber Criminals
Like
Clip
Share
Transcript
More
Play Full