Storytelling

Malicious Life

Malicious Life

+1 FAN

Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unravel...Show More

Best
Newest
Looking for recently uploaded episodes
The Fall Of Mt. Gox – Part 2

49:51 | Feb 6th

In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside.

Malicious Life, episode 12: The Soldiers of North Korea

33:34 | Nov 15th, 2017

Guerrilla warfare has been around for as long as conventional warfare has. The idea that a small force, through cunning and brazen action, could overtake a larger force is an old one. From pirates who would take merchant ships by surprise, to lengthy...Show More

Malicious Life, episode 9: Stuxnet, part 3

29:41 | Oct 2nd, 2017

Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of the modern cyber war, and look further into the topic ...Show More

Malicious Life, episode 8: Stuxnet, part 2

26:57 | Sep 18th, 2017

Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to "think" its way to its destination. An invisible commando unit, drop...Show More

Malicious Life, episode 7: Stuxnet, part 1

33:15 | Aug 30th, 2017

Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world's perception of cyber warfare forever. Dubbed Stuxnet, this malicious piece of code has a s...Show More

The Location Data Brokers – A CYBER Podcast Special

45:32 | Jan 24th

CYBER is a new podcast from Motherboard, a very well known and respected technology blog and online magazine. The episode you’ll hear shortly is about the shady market of data aggregators and brokers who sell smartphone location data to bounty hunte...Show More

The Fall Of Mt. Gox – Part 1

49:51 | Jan 22nd

In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside.

Black Duck Eggs: Darknet Diaries

31:45 | Jan 8th

This week we're doing an episode swap with the excellent podcast Darknet Diaries. A former NSA agent who has gone off to be a security consultant, tells a story about an assignment that he'll never forget...

Dave Kennedy: The Psychological Principles of Social Engineering

37:46 | Dec 25th, 2018

Today on Malicious Life, tens of thousands of people get robbed.  Then a community gets together to ask: should we take our money back, or let the hacker walk with it?

The Ethereum DAO Hack

39:47 | Dec 13th, 2018

Today on Malicious Life, tens of thousands of people get robbed.  Then a community gets together to ask: should we take our money back, or let the hacker walk with it?

The Jerusalem Virus, Part 2

28:20 | Nov 26th, 2018

How did the Jerusalem virus trigger the birth of the entire Anti Virus industry in Israel? A high-stakes wager on Live TV, and more.

The Jerusalem Virus, Part 1

24:07 | Nov 15th, 2018

Although scary, the Jerusalem virus, discovered in Israel in 1987, was in fact a rather simple virus. How, then, did the virus trigger the birth of an entire national industry?

Gene Spafford on the Morris Worm & Cyber-security in the 1980’s

55:11 | Oct 31st, 2018

Eugene Spafford (aka Spaf), a professor of computer science at Purdue University, was the first researcher to publish a detailed analysis of the infamous Morris Worm. Gene talks to Ran about this incident, as well as how was security different in the...Show More

China Vs. Github

41:11 | Oct 16th, 2018

It’s a weapon that harnessed the strength of millions of computers at once: a cannon so powerful it could break through any wall, take down any website. It is “the Great Cannon”.

The Ashley Madison Hack, Part 2

32:43 | Oct 4th, 2018

On the second installment of our Ashely Madison hack retelling, we look at the fallout of one of the hack, and the people who’ve suffered from it.

The Ashley Madison Hack, Part 1

29:48 | Sep 19th, 2018

When Ashley Madison got hacked, it made international headlines. Why? Because it wasn’t just a major event. It demonstrated how there’s information even more sensitive, even more significant than your credit card, or your social security number: your...Show More

Interview Special: Graham Cluley

53:56 | Sep 5th, 2018

As we prepare to release an awesome 2-part story in two weeks, we decided to give you a chance to go back to some old favorites and check out some of the behind-the-scenes interviews of Malicious Life. Graham Cluley tells about his entry into the wor...Show More

The Target Hack

35:05 | Aug 23rd, 2018

If movies have taught me anything, it’s that if you want to rob a bank, you dress as the cleaning crew. The people behind the Target hack must have seen one action film too many, because when they decided to hack one of the biggest retailers in the w...Show More

WoW: Corrupted Blood

26:56 | Jul 25th, 2018

How does the outbreak of a “plague” inside a video game- a bug, essentially- affect real-life disease research?

The Stuxnet Virus Pt. 3

29:55 | Jul 12th, 2018

Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of the modern cyber war, and look further into the topic ...Show More

The Stuxnet Virus Pt. 2

27:18 | Jul 12th, 2018

Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way to its destination. An invisible commando unit, drop...Show More

The Stuxnet Virus Pt. 1

33:41 | Jul 12th, 2018

Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever. Dubbed Stuxnet, this malicious piece of code has a s...Show More

Shamoon – The Biggest Hack In History

26:41 | Jun 29th, 2018

The Shammon Virus. There is a single company, run by a royal family, which employs the majority of the Saudi working population. It’s worth more than Apple, Google, and Amazon…by a lot. The Saudi Aramco oil company is one of the most significant comm...Show More

The Melissa Virus

21:38 | Jun 14th, 2018

Not all malware is created equal. Some malware will attempt to erase your files, demand ransom, or steal your information. Others will do no such thing- and still end up being worse. Don’t believe us? What if a virus made your computer send pornograp...Show More

GhostNet

28:20 | May 30th, 2018

A young woman is arrested by the Chinese government while trying to cross the border to Tibet. Her interrogator, a Chinese spy, pulls out a dossier full of information regarding her activity online. It turns out she’s been visiting pro-Tibet websites...Show More

The Morris Worm Pt. 2

22:20 | May 16th, 2018

In an attempt to halt the Morris worm’s path of destruction, a systems administrator at Harvard shut down the university router through which Andy Sudduth’s message would be sent to the internet.  The post didn’t go through until after it was too lat...Show More

The Morris Worm Pt. 1

26:49 | May 2nd, 2018

We’ve introduced you to some of the seminal malware attacks that have shaped cybersecurity history. Perhaps no other incident in history, though, has had the effect on how we think about computer security today as the Morris worm.

The Half Life 2 Hack

38:28 | Apr 18th, 2018

How far should a die-hard fan go, in order to bring closer to them the thing that they love? In one of the most interesting, yet relatively unknown cybersecurity stories, a young hacker attempts to steal his favorite game prior to its release and the...Show More

The Legalities of the Cyber War

23:08 | Apr 4th, 2018

Catching a criminal is by no means easy, but there’s something we take for granted in any crime: that the criminal has a face and a name, that they used a specific weapon on a specific target, and that the crime had ended once it was complete.   But ...Show More

Fancy Bear, Cozy Bear

31:02 | Mar 21st, 2018

When representatives from the Democratic National Committee reached out to a silicon valley cybersecurity company, to investigate a potential breach in their computer system, it’s hard to imagine what they might have expected to come of it. It didn’t...Show More

Hack Back

34:26 | Mar 7th, 2018

Those who have experienced a cybercrime know the feelings of frustration and helplessness that come along with it. A hacker could be halfway across the world when they attack you, and you might have no way of figuring out who it was or catching them ...Show More

Cyber Terrorism

31:50 | Feb 21st, 2018

What governments and powerful organizations regularly use, others will find ways to use as well. Cyber activity fits so incredibly well with terrorism. Actors can remain hidden, or reveal themselves to the world; Create propaganda campaign, or aim fo...Show More

Super Spies

35:16 | Feb 7th, 2018

The NSA has many means at its disposal. But how does it use these means, and for what goals? Discover the (literally) secret history of the NSA’s cyber activity. Travel with us to Russia and back, learn the origins of FISA, and find out more about th...Show More

The Trojan Horse Affair

22:53 | Jan 24th, 2018

The early 2000s were an interesting time in Information Security. This is roughly the period when malware transitioned from viruses written by teenagers for fun, to cybercrime tools in the hands of sophisticated criminals. This week’s story took plac...Show More

Friend or Foe

36:52 | Jan 10th, 2018

The largest hack in U.S military history may have been conducted by… The NSA. In 1997, a wargame conducted by the NSA showed just how unprepared we were for a potential cybernetic strike- in 4 days, NSA hackers were able to take down entire military ...Show More

Amit Serper Interview- Holiday Special Episode

39:35 | Dec 27th, 2017

It’s the holidays and everyone’s on vacation – but the Internet never rests and neither do the bad guys in cybersecurity. So, for this holiday special, we figured we’ll air an interesting interview we did a few weeks back with Amit Serper, Principal ...Show More

Deception

30:18 | Dec 13th, 2017

From the Bulgarian hacker scene of the 90’s, featured in episodes 1 and 2, we now move to the vibrant underground hacker scene of West and East Berlin. Working secretly for the KGB, a young Berliner hacker attempts to hack the U.S military network, o...Show More

Malicious Life, episode 13: Weapons of Mass Disruption

40:54 | Nov 29th, 2017

The threat of fire and fury stands at the center of all modern conflicts- nuclear bombs that can eradicate life in seconds are the ultimate weapon of war, as they pose a huge threat to centers of population. But what of the cyber war? What threat cou...Show More

Malicious Life, episode 11: The Propaganda

39:58 | Nov 1st, 2017

Governments around the world have been making devious use of the internet as a platform to spread, not malware, but propaganda. As in all wars, propaganda is a huge part of the modern cyber war. Join us as we explore the roots, and the most creative ...Show More

Malicious Life, episode 10: The Whistleblowers

36:09 | Oct 17th, 2017

WikiLeaks has ushered in a new age in whistle blowing: Modern leakers such as Chelsea Manning - who's story is the focus of our current episode - expose huge amounts of confidential information. But can these mega-leaks really influence the actions a...Show More

Malicious Life, Episode 6: Hell to Pay

0:00 | Aug 21st, 2017

A global FBI manhunt for the world’s most wanted cyber criminal ends in the capture of a massive criminal network, but with the escape of the man himself. Security experts who operate within the gray areas of morality develop botnets that destroy per...Show More

Malicious Life, Episode 5: The Roots of Evil

0:00 | Aug 7th, 2017

WannaCry’s widespread cyber attack on more than 200,000 computers all over the world made headlines - but only a few people remember a similar attack, named The AIDS Trojan, almost 30 years earlier... In this episode of Malicious Life, we go deep int...Show More

Malicious Life, Episode 4: Big Cannons

0:00 | Jul 24th, 2017

2016 is known throughout the circles of information security as “The Year of The DDoS Attacks”, and rightfully so: 5 large scale DDoS attacks - ‘Distributed Denial Of Service’ - shocked the technology world. In this episode of Malicious Life, we exam...Show More

Malicious Life, Episode 3: Spam Empire

31:00 | Jul 6th, 2017

In this episode of Malicious Life, we take a look at one of the oldest forms of shady dealings on the web- spam mail. A multi-million dollar industry, spam served as a half step between the lone malware creators of the 80’s and 90’s, and the well-oil...Show More

Malicious Life, Episode 2: The Dark Avenger

0:00 | Jun 30th, 2017

In 1989, a message was found in a virus: "Eddie Lives…Somewhere in Time!". 'Eddie' was a particularly nasty virus, and its discovery led a young Bulgarian security researcher down a rabbit hole, on a hunt for the prolific creator of the Eddie virus: ...Show More

Malicious Life, Episode 1: Ghost In The Machine

26:09 | Jun 28th, 2017

Cybercrime is one of the most notable threats we face as computer users, nowadays. But it wasn’t always so. Those of us who’ve been in the field long enough may remember a time when computer viruses were much more innocent, and virus authors were usu...Show More