Malicious Life cover art

All Episodes

Malicious Life — 265 episodes

#
Title
1

Weev, Part 2

2

Weev, Part 1

3

Cuckoo Spear [B-Side]

4

The Man Who Went To War With Anonymous - And Lost

5

What Can Organizations Learn from "Grim Beeper"? [B-Side]

6

The Fappening/Celebgate

7

Operation Snow White, Part 2

8

Operation Snow White, Part 1

9

Caught in the Crossfire: Infighting and Treason in Russia’s Cyber World

10

SNAP Fraud: Getting Rich by Stealing from the Poor

11

The Hollywood Con Queen, Part 2

12

The Hollywood Con Queen, Part 1

13

The Doomed Queen’s Secret Ciphers

14

Why Did People Write Viruses In The 80s & 90s?

15

Section 230: The Law that Makes Social Media Great, and Terrible

16

What Happened at Uber?

17

The Nigerian Prince

18

Unmasking Secrets: The Rise of Open-Source Intelligence

19

The Source Code of Malicious Life

20

The Y2K Bug, Part 2

21

The Y2K Bug, Part 1

22

Can You Bomb a Hacker?

23

Kevin Mitnick, Part 2

24

Kevin Mitnick, Part 1

25

SIM Registration: Security, or Surveillance?

26

The Mariposa Botnet

27

The Real Story of Citibank’s $10M Hack

28

How to Hack Into Satellites

29

Moonlight Maze

30

Volt Typhoon

31

Is NSO Evil? Part 2

32

Is NSO Evil? Part 1

33

Should You Pay Ransomware Attackers? A Game Theory Approach

34

Silent Firewalls: The Underrepresentation of Women in Cyber

35

Operation Kudo

36

Can We Stop the AI Cyber Threat?

37

Is Generative AI Dangerous?

38

Why aren't there more bug bounty programs?

39

The Voynich Manuscript

40

Roman Seleznev: Did the Punishment Fit the Crime?

41

Sony BMG's Rootkit Fiasco

42

Ad Fraud, Part 2

43

Ad Fraud, Part 1

44

The Economics Of Cybersecurity

45

The Reason You Don’t Have Data Privacy

46

How Entire Countries Can Lose the Internet

47

Olympic Destroyer

48

The Lawerence Berkeley Hack, Part 2

49

The Lawerence Berkeley Hack, Part 1

50

Russian Propaganda, Explained [ML B-Side]

51

Operation Ivy Bells

52

Why Do NFTs Disappear? [ML BSide]

53

The (Other) Problem with NFTs

54

SIM Swapping Follow Up [ML B-Side]

55

You Should Be Afraid of SIM Swaps

56

FBI vs. REvil [ML BSide]

57

Cyberbunker, Part 2

58

Cyberbunker, Part 1

59

How Netflix Learned Cloud Security

60

Fred Cohen: The Godfather of Computer Viruses [ML B-Side]

61

Thamar Reservoir

62

The Problem With Kernel-Mode Anti-Cheat Software

63

Norse Corp.: How To NOT build a cybersecurity startup

64

Jailbreaking Tractors [ML BSide]

65

The Russian Business Network

66

What can Chess grandmasters teach us about Cyber? [ML BSide]

67

LabMD Vs. The FTC

68

What Would Happen if CBS Got Hacked? [ML BSide]

69

Hacking Stock Markets, Part 2

70

Vishing: Voice Scams [ML BSide]

71

Hacking Stock Markets, Part 1

72

What’s it's Like to Fight LulzSec [ML B-Side]

73

"King Kimble": Kim DotCom

74

Hacking Multi-Factor Authentication

75

Hacking Language Models

76

Software Bill of Materials (SBOMs) [ML BSide]

77

Leo Kuvayev– The Czar of Spammers

78

"A CISO's Nightmare": Israel Baron on Railway Secuirty

79

“Designed by criminals, for criminals”: Operation Trojan Shield

80

Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]

81

Silk Road, The Amazon of Drugs - Part 2

82

Kurtis Minder: Ransomware Negotiations [ML BSide]

83

Silk Road: The Amazon of drugs, Part 1

84

Jacob Goldstein: The Future of BitCoin [ML BSide]

85

The “Cypherpunks” Who Invented Private Digital Money

86

Malicious LIVE: Celebrating 5 Years of Malicious Life

87

Hackers vs. Spies: The Stratfor Leaks, Pt. 2

88

Hackers vs. Spies: The Stratfor Leaks, Pt. 1

89

Catching A Cybercriminal [ML B-Side]

90

What The LinkedIn Hack Taught Us About Storing Passwords

91

Operation CuckooBees [ML B-Side]

92

How to Russia-Proof Your Democracy [ML BSide]

93

Op. Sundevil And The Birth of the EFF

94

MITRE Attack Flow [ML B-Sides]

95

Aaron Swartz

96

The Russia-Ukraine Cyberwar [ML B-Side]

97

Chris Roberts: Hackers on a Plane

98

DIE - A New Paragidm for Cyber Security [ML B-Side]

99

Cyber PTSD

100

How Resilient Is Our Banking System?

101

How Resiliant Is Our Banking System? [ML BSide]

102

Crypto AG, Part 3: The Truth Is Revealed

103

Quantum Cyber Security [ML BSide]

104

Crypto AG, Part 2: The Death of Bo Jr.

105

Why do APTs use Ransomeware? [ML BSide]

106

Crypto AG - The Greatest Espionage Operation Ever, Part 1

107

Why aren't SMBs investing in Cyber Security? [ML B-Side]

108

The Bloody Origins of Israel's Cyber Security Industry

109

Hacker Highschool: Pete Herzog [ML BSide]

110

The Mystery of Cicada 3301

111

How the Internet Changed the NSA

112

Is Code === Free Speech?

113

A digital 'vaccine' for Log4Shell [ML BSide]

114

Shawn Carpenter: A Cyber Vigliante

115

Ransomware Attackers Don’t Take Holidays [ML B-Side]

116

Tay: A Teenage Bot Gone Rogue

117

Wild West Hackin' Fest [ML BSide]

118

Operation Flyhook, Part 2

119

IP Hijacking [ML BSide]

120

Operation Flyhook, Part 1

121

In Defence Of the NSA [ML B-Side]

122

Marcus Hutchins - An Accidental Hero

123

Operation GhostShell

124

Smart TVs: A New Battlefield

125

The MITRE ATT&CK Framework

126

Should The U.S. Ban Chinese and Russian Technology?

127

Jack Rhysider, Darknet Diaries [ML B-Side]

128

The Tesla Hack

129

Understanding China [ML B-Side]

130

John McAfee

131

RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]

132

DeadRinger [ML B-Side]

133

The Jester

134

The State of Credit Card Security [ML B-Side]

135

Albert Gonzalez, Part 3

136

DerbyCon - Dave Kennedy [ML B-Side]

137

Albert Gonzalez, Part 2

138

Jeff Moss: DEF CON [ML B-Side]

139

Albert Gonzales, Part 1

140

THOTCON Hacking Conference [ML BSide]

141

China's Unrestricted Warfare, Part 3

142

Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]

143

RSA Breach, Part 2

144

RSA Breach: The Untold Story, Part 1

145

China's Unrestricted Warfare, Part 2

146

Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]

147

China's Unrestricted Warfare, Part 1

148

Can Nuclear Power Plants Be Hacked?

149

Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]

150

L0pht, Part 2

151

The Story of 'L0pht', Part 1

152

MS Exchange Hack [ML B-Side]

153

NotPetya Part 2

154

NotPetya Part 1

155

Facial Recognition in Law Enforcment, Part 2

156

Should Law Enforcement Use Facial Recognition? Pt. 1

157

Clearview AI

158

Breaking Into Buildings

159

Special: The Solarwinds Hack

160

100th Episode Special

161

Jan Sloot's Incredible Digital Coding System

162

Op. GUNMAN & The World's First Keylogger

163

Election Hacking, Part 2

164

Election Hacking, Part 1

165

MDR Vs. The TrickBot Gang

166

Yahoo's Ugly Death, Part 2

167

Yahoo's Ugly Death, Part 1

168

The Great Firewall of China, Pt. 2: Cisco's Trial

169

The Great Firewall of China - Part 1

170

Troy Hunt - Interview

171

Multi-Stage Ransomware (Live)

172

Protecting The Panama Papers Whistleblower

173

From Ransomware To Blackmail, With Assaf Dahan

174

SegWit2x, Part 3

175

SegWit2x Part 2

176

Hacking Fortnite Accounts (CPRadio)

177

SegWit2x, or - The Year Bitcoiners Will Never Forget, Part 1

178

No Honor Among Thieves

179

Maintaining Secure Business Continuity With A Remote Workforce - With Sam Curry

180

The Problem With Passwords

181

Steven Wozniak Interview, Deep 2017

182

The Hauwei Ban, Part 2

183

The Huawei Ban, Part 1

184

The Max Headroom Signal Hijack

185

ToTok, Part 3: Becoming a Spyware Superpower

186

Operation Glowing Symphony

187

ToTok, Part 2: The Masterminds of Mobile Malware

188

ToTok, Part 1: How to Convince Someone to Download Spyware

189

How To Defend A Bank, Pt. II: Right of Bang

190

How To Defend A Bank, Part 1: Fusion Centers

191

Triton, Part 2: The World’s Most Dangerous Malware

192

Triton Part 1

193

Dead Drops

194

Deep Fakes, Part 2: Man Vs. Machine

195

GAN and Deep Fakes, Part 1

196

Sam Curry: The 2020 Crystal Ball

197

Human Side Channels

198

What's the problem with Cyber Insurance?

199

Gozi B-Side: Amit Serper & Sam Curry

200

Gozi Part 2

201

EP61: Prying Eyes

202

EP60: ML B-Side: Lodrian Cherne On Stalkerware

203

EP59: Gozi, Part 1: The Rise of Malware-as-a-Service

204

EP58: How is Spyware Legal?

205

EP57: Listeners Survey Special

206

EP56: Operation Aurora, Part 2

207

EP55: Operation Aurora, Part 1

208

Responding to a Cyber Attack with Missiles

209

EP53: Are Ad Blockers Malicious?

210

ML_Conficker

211

Operation SoftCell

212

'Pa Bell' Vs. Youth International Party Line

213

The U.S vs. Gary McKinnon

214

The WANK Worm, Part 2

215

The WANK Worm, Part 1

216

The Equifax Data Breach Pt. II: The Bits Hit The Fan

217

The Equifax Data Breach Pt. I: A Big Data Bubble

218

DeCSS: Hackers Vs Hollywood

219

Marconi & The Maskelyne Affair

220

The Fall Of Mt. Gox – Part 2

221

The Location Data Brokers – A CYBER Podcast Special

222

The Fall Of Mt. Gox – Part 1

223

Black Duck Eggs: Darknet Diaries

224

Dave Kennedy: The Psychological Principles of Social Engineering

225

The Ethereum DAO Hack

226

The Jerusalem Virus, Part 2

227

The Jerusalem Virus, Part 1

228

Gene Spafford on the Morris Worm & Cyber-security in the 1980’s

229

China Vs. Github

230

The Ashley Madison Hack, Part 2

231

The Ashley Madison Hack, Part 1

232

Interview Special: Graham Cluley

233

The Target Hack

234

WoW: Corrupted Blood

235

The Stuxnet Virus Pt. 3

236

The Stuxnet Virus Pt. 2

237

The Stuxnet Virus Pt. 1

238

Shamoon – The Biggest Hack In History

239

The Melissa Virus

240

GhostNet

241

The Morris Worm Pt. 2

242

The Morris Worm Pt. 1

243

The Half Life 2 Hack

244

The Legalities of the Cyber War

245

Fancy Bear, Cozy Bear

246

Hack Back

247

Cyber Terrorism

248

Super Spies

249

The Trojan Horse Affair

250

Friend or Foe

251

Amit Serper Interview- Holiday Special Episode

252

Deception

253

Weapons of Mass Disruption

254

The Soldiers of North Korea

255

The Propaganda

256

The Whistleblowers

257

Stuxnet, part 3

258

Stuxnet, part 2

259

Stuxnet, part 1

260

Hell to Pay

261

The Roots of Evil

262

Big Cannons

263

Spam Empire

264

The Dark Avenger

265

Ghost In The Machine