Malicious Life cover image

Malicious Life

Latest episodes

undefined
Mar 31, 2024 • 27min

The Y2K Bug, Part 1

Bob Bemer, a computer scientist, discusses the high cost of storage leading to the Y2K bug. The podcast explores the legacy of Robert Beemer, implications of two-digit year storage, and the battle for four-digit years. It delves into the panic and precautions surrounding the Y2K problem in various sectors and the cybersecurity solutions implemented.
undefined
13 snips
Mar 19, 2024 • 31min

Can You Bomb a Hacker?

Exploring the implications of civilian participation in cyberwarfare, focusing on real-world examples in Ukraine. Discussing the challenges faced by government and media websites during conflicts. Delving into the legal and ethical considerations of cyber warfare and the innovative methods adopted by citizens in modern warfare scenarios.
undefined
Mar 4, 2024 • 49min

Kevin Mitnick, Part 2

Kevin Mitnick resists temptation to hack, but is lured back in by SAS system. Evading FBI surveillance with social engineering, he goes underground. Pursued by FBI, he transforms into Eric Weiss. Confrontation with FBI leads to a final showdown. Mitnick reflects on legacy as hacker turned security consultant.
undefined
Feb 19, 2024 • 37min

Kevin Mitnick, Part 1

Legendary social engineer Kevin Mitnick shares his obsession with hacking communication systems, from childhood adventures hacking phone companies to risky encounters with the FBI. Despite personal losses and betrayals, Mitnick's resilience and resourcefulness shine through as he delves into the thrill of exploration-driven hacking.
undefined
Feb 5, 2024 • 31min

SIM Registration: Security, or Surveillance?

Hundreds of thousands of people in Namibia are facing the choice of giving up their data privacy or losing phone service. The implications of SIM card registration on data privacy and phone service are explored. The challenges of compliance and the dominance of MTC Namibia are discussed. Concerns about the collection and use of biometric data are raised. The absence of privacy protection laws and the risks of inadequate regulation are highlighted. National security experiments and a storytelling event are mentioned.
undefined
Jan 22, 2024 • 44min

The Mariposa Botnet

The podcast discusses the Mariposa Botnet, which infected millions of PCs and targeted Future 100 companies. It reveals that the botnet was operated by script kiddies with no coding knowledge. The podcast explores the origins and creation of the botnet, as well as the use of dynamic DNS to evade law enforcement. It also delves into the collaboration and formation of the Mariposa Working Group, their efforts to take down the botnet, and the forensic investigation that led to the arrest of the botnet's accomplices. The podcast ends with announcements about a New York listeners meetup and mentions of job opportunities and sponsors.
undefined
Jan 9, 2024 • 33min

The Real Story of Citibank’s $10M Hack

Guest Valdimir Levin, often ranked among the top 10 greatest hackers, discusses the truth behind the notorious $10.7M Citibank hack. Journalists misrepresented Levin's skills, but anonymous hacker Arknoid sheds light on the story. They explore vulnerabilities in Citibank's BBS, collision of hackers, and the mastermind behind the hack.
undefined
Dec 27, 2023 • 30min

How to Hack Into Satellites

This podcast explores the challenges faced by researchers in surveying satellite cybersecurity, including engineers' reluctance to share information. It delves into methods of hacking satellite systems and the potential consequences of such attacks. It also discusses the process of hacking into satellites, the difficulties faced by cyber attackers, vulnerabilities in satellite security, and the efforts taken to address threats to satellite communication networks.
undefined
Dec 11, 2023 • 35min

Moonlight Maze

The podcast explores the birth of Russia's Turla APT espionage group through the discovery of extensive hacking on US military networks. It discusses the historical significance of the Moonlight Maze cyber espionage campaign and its connection to TULA. The ongoing cyber war between Russian hackers and American defenders is revealed, along with the origins of Turla. A US delegation's investigation into the cyber attack implicates the Russian government and sheds light on the activities of TULA.
undefined
Nov 28, 2023 • 32min

Volt Typhoon

A hacker group called Volt Typhoon launched a series of cyber attacks targeting various locations including power plants and water treatment facilities. The podcast explores the group's tactics, challenges faced by analysts in detecting their actions, and the need for proactive security measures. It also discusses the importance of multi-factor authentication and modern defenses in preventing cyber attacks. The chapter ends with reflections on past experiences and upcoming online talk.

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode