
Malicious Life
The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews f
...more
Technology
The Lawerence Berkeley Hack, Part 2
Oמ May 23rd, 1989, Karl Koch – a 23 years ...
more
Mar 20 2023 35m
Chapter 1 20 mins
The Tragic Tale of Carl KochChapter 2 14 mins
The Fight Against Ransomware
The Lawerence Berkeley Hack, Part 1
Four decades ago, three quarters would’ve gone a...
more
Mar 8 2023 29m
Chapter 1 10 mins
Uncovering a Malicious Hacker in 1986Chapter 2 19 mins
Tracking a Hacker
Rssian Propaganda, Explained [ML B-Side]
You may have heard of the cyber operations perfo...
more
Feb 28 2023 33m
Chapter 1 12 mins
Russian Disinformation TacticsChapter 2 12 mins
The Impact of Russian Disinformation StrategiesChapter 3 6 mins
Countering Disinformation CampaignsChapter 4 1 min
Be Cautious With Information Sharing
Operation Ivy Bells
In the early 1970’s, US intelligance point...
more
Feb 20 2023 44m
Chapter 1 15 mins
Operation IV BillsChapter 2 9 mins
Deep Sea Diving DangersChapter 3 18 mins
The Red-Haired Defector
Why Do NFTs Disappear? [ML B-Side]
What happens when an NFT marketplace goes under,...
more
Feb 13 2023 27m
Chapter 1 11 mins
Risks of NFT MarketplacesChapter 2 14 mins
Protecting NFTs From Third-Party RiskChapter 3 1 min
Simplifying Wallets for NFT Users
The (Other) Problem with NFTs
Physical artworks in museums are usually well-gu...
more
Feb 6 2023 27m
Chapter 1 7 mins
Securing Physical & Digital ArtworksChapter 2 8 mins
Smart Contract Vulnerabilities and Ransomware PreventionChapter 3 11 mins
Dangers of NFT Gold Rush
SIM Swapping Follow Up [ML B-Side]
Today we’re bringing back Haseeb Awan, the found...
more
Jan 30 2023 18m
Chapter 1 14 mins
Cyber Security and SimSwap PreventionChapter 2 3 mins
Protecting Yourself Against Hacking
You Should Be Afraid of SIM Swaps
If SIM swap stories ever make the news, almost u...
more
Jan 23 2023 33m
Chapter 1 8 mins
Lose Everything in Half an HourChapter 2 14 mins
Verizon Customer Support Agent FrustrationChapter 3 9 mins
The Reality of Being Hacked
Cyberbunker, Part 2
Spamhaus’s decision to add Cyberbunker to ...
more
Jan 10 2023 31m
How Netflix Learned Cloud Security [ML B-Side]
2011 was a pivotal year for Netflix: the now hug...
more
Dec 26 2022 20m
Fred Cohen: The Godfather of Computer Viruses [ML B-Side]
In his 1984 seminal paper – “Compute...
more
Dec 19 2022 29m
The Problem With Kernel-Mode Anti-Cheat Software [ML B-Side]
Nobody likes cheaters, especially in video games...
more
Dec 6 2022 33m
Norse Corp.: How To NOT build a cybersecurity startup
When it was founded in 2011, Norse Corp. –...
more
Nov 28 2022 39m
Jailbreaking Tractors [ML BSide]
John Deere, an American agricultural machinery m...
more
Nov 23 2022 24m
The Russian Business Network
In 2006 the Russian Business Network pivoted its...
more
Nov 14 2022 31m
What can chess grandmasters teach us about Cyber? [ML BSide]
Sports is not something that you usually hear me...
more
Nov 8 2022 23m
What Would Happen if CBS Got Hacked? [ML BSide]
Media companies probably get hacked no more than...
more
Oct 24 2022 22m
Hacking Stock Markets, Part 2
Financial markets make good targets for criminal...
more
Oct 18 2022 29m
Vishing: Voice Scams [ML BSide]
Authentication has come a long way since the 198...
more
Oct 10 2022 25m
Hacking Stock Markets, Part 1
In any trading market, at any time in history, n...
more
Oct 4 2022 29m
What it’s Like to Fight LulzSec [ML B-Side]
The name Lulzsec is probably very familiar to li...
more
Sep 27 2022 24m