Ranked #1
Spam Empire
Spam Empire
In this episode of Malicious Life, we take a look at one of the oldest forms of criminal activity on the web- the spam e... Read more
6 Jul 2017
•
31mins
Ranked #2
Operation Aurora, Part 1
Operation Aurora, Part 1
In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attrib... Read more
12 Sep 2019
•
34mins
Similar Podcasts
Ranked #3
Gozi, Part 1: The Rise of Malware-as-a-Service
Gozi, Part 1: The Rise of Malware-as-a-Service
Nikita Kuzmin could have been a whiz programmer or a CEO of a successful startup. But as a teen in Moscow, he fell in wi... Read more
31 Oct 2019
•
29mins
Ranked #4
GAN and Deep Fakes, Part 1
GAN and Deep Fakes, Part 1
Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and... Read more
19 Dec 2019
•
43mins
Ranked #5
Big Cannons
Big Cannons
2016 is known throughout the circles of information security as “The Year of The DDoS Attacks”, and rightfully so: 5 lar... Read more
24 Jul 2017
•
44mins
Ranked #6
Triton: A Malware Designed To Kill Humans, Part 1
Triton: A Malware Designed To Kill Humans, Part 1
Industrial Security requires a different skill set–really, an entirely different mindset than working in IT does. In thi... Read more
16 Jan 2020
•
36mins
Ranked #7
The Equifax Data Breach Pt. I: A Big Data Bubble
The Equifax Data Breach Pt. I: A Big Data Bubble
In their 120 year history, Equifax never sold anything, or provided any service to ordinary folks – except collect DATA.... Read more
27 Mar 2019
•
3mins
Ranked #8
Hell to Pay
Hell to Pay
A global FBI manhunt for the world’s most wanted cyber criminal ends in the capture of a massive criminal network, but w... Read more
21 Aug 2017
•
37mins
Ranked #9
The Ashley Madison Hack, Part 1
The Ashley Madison Hack, Part 1
When Ashley Madison got hacked, it made international headlines. Why? Because it wasn’t just a major event. It demonstra... Read more
19 Sep 2018
•
29mins
Ranked #10
Super Spies
Super Spies
The NSA has many means at its disposal. But how does it use these means, and for what goals? Discover the (literally) se... Read more
7 Feb 2018
•
34mins
Ranked #11
How is Spyware Legal?
How is Spyware Legal?
Today’s Cyber Stalkers have free access to almost government-grade spyware software with which they can terrorize their ... Read more
17 Oct 2019
•
41mins
Ranked #12
The Target Hack
The Target Hack
If movies have taught me anything, it’s that if you want to rob a bank, you dress as the cleaning crew. The people behin... Read more
23 Aug 2018
•
33mins
Ranked #13
The Roots of Evil
The Roots of Evil
WannaCry’s widespread cyber attack on more than 200,000 computers all over the world made headlines – but only a few peo... Read more
7 Aug 2017
•
30mins
Ranked #14
DeCSS: Hackers Vs Hollywood
DeCSS: Hackers Vs Hollywood
Twenty years ago, a 15-years old Norwegian kid was put on trial for breaking the DVD Copy Prevention system. His case sp... Read more
13 Mar 2019
•
44mins
Ranked #15
The Fall Of Mt. Gox – Part 1
The Fall Of Mt. Gox – Part 1
In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from th... Read more
22 Jan 2019
•
49mins
Ranked #16
What’s the problem with Cyber Insurance?
What’s the problem with Cyber Insurance?
Thousands of companies are losing millions of dollars to cyber attacks. An insurance seems an ideal solution to their wo... Read more
21 Nov 2019
•
35mins
Ranked #17
Stuxnet, part 1
Stuxnet, part 1
Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was ... Read more
30 Aug 2017
•
33mins
Ranked #18
The Ashley Madison Hack, Part 2
The Ashley Madison Hack, Part 2
On the second installment of our Ashely Madison hack retelling, we look at the fallout of one of the hack, and the peopl... Read more
4 Oct 2018
•
32mins
Ranked #19
Human Side Channels
Human Side Channels
Even the best hackers are human, and humans are inescapably unique. Forensic Linguistics, Behavioral Signatures and Cult... Read more
5 Dec 2019
•
33mins
Ranked #20
Deep Fakes, Part 2: Man Vs. Machine
Deep Fakes, Part 2: Man Vs. Machine
Deep Fakes are set to revolutionize content creation, but alongside this technology’s benefits, it also has the potentia... Read more
2 Jan 2020
•
37mins