Ahorra 5 meses con 1 año de Premium al 35% dto ¡Lo quiero!
Malicious Life

podcast

Suscribirse

Malicious Life

Por Malicious Life
En Malicious Life

The Y2K Bug, Part 2

In the waning years of the 20th century, amid growing anxieties about the turn of the millennium,...

Añadir a ... 

The Y2K Bug, Part 1

In the 1950s and 60s - even leading into the 1990s - the cost of storage was so high, that using...

Añadir a ... 

Can You Bomb a Hacker?

The 2008 Russo-Georgian War marked a turning point: the first time cyberattacks were used...

Añadir a ... 

Kevin Mitnick, Part 2

In 1991, Kevin Mitnick was bouncing back from what was probably the lowest point of his life. He...

Añadir a ... 

Kevin Mitnick, Part 1

For Kevin Mitnick - perhaps the greatest social engineer who ever lived - hacking was an...

Añadir a ... 

SIM Registration: Security, or Surveillance?

Right now, hundreds of thousands of people in the southern African country of Namibia are faced...

Añadir a ... 

The Mariposa Botnet

In 2008, The 12 million PCs strong Mariposa Botnet infected almost half of Furture 100 companey -...

Añadir a ... 

The Real Story of Citibank’s $10M Hack

Valdimir Levin is often presented as "the first online bank robber," and appeares on many lists...

Añadir a ... 

How to Hack Into Satellites

About a year ago, six academics from Ruhr University Bochum and the CISPA  Helmholtz Center for...

Añadir a ... 

Moonlight Maze

When investigators discovered in 1996 that US military networks were being extensively hacked,...

Añadir a ... 

Volt Typhoon

In August 2021, a port in Houston, Texas, was attacked. Over the following months, a series of...

Añadir a ... 

Is NSO Evil? Part 2

By the time Forbidden Stories published its “Pegasus Project” in 2021, NSO was already knee deep...

Añadir a ... 

Is NSO Evil? Part 1

NSO Group, creator of the infamous Pegasus spyware, is widely regarded as a vile, immoral...

Añadir a ... 

Should You Pay Ransomware Attackers? A Game Theory Approach

The FBI explicitly advises companies against paying ransomware attackers - but itself payed 4.4...

Añadir a ... 

Silent Firewalls: The Underrepresentation of Women in Cyber

In the vast landscape of STEM, women constitute a mere 28% of the workforce. Yet, when we zoom...

Añadir a ... 

Operation Kudo

In 1981, during the G7 Summit in Quebec, French president Francois Mitterand handen President...

Añadir a ... 

Can We Stop the AI Cyber Threat?

Much of the cybersecurity software in use today utilizes AI, especially things like spam filters...

Añadir a ... 

Is Generative AI Dangerous?

Every so often, the entire landscape of cybersecurity shifts, all at once: The latest seismic...

Añadir a ... 

Why aren't there more bug bounty programs?

On the face of it, there's an obvious economic incentive for both vendors and security...

Añadir a ... 

The Voynich Manuscript

The constant battle between those who wish to encrypt data and those who wish to break these...

Añadir a ...