Created with Sketch.
30 minutes | 5 days ago
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]
Security BSides – or just ‘BSides’, for short’ – is the first grassroots, DIY, open security conference in the world – with more than 650 events in more than 50 countries. Jack Daniel, one of BSides’ founders, recalls how the conference started, and what do such ‘community-oriented’ events contribute that other events often cannot. The post Creating a Grassroots Security Conference: Jack Daniel [ML B-Side] appeared first on Malicious Life.
34 minutes | 12 days ago
China’s Unrestricted Warfare, Part 1
Back in the 1990s, Cyberwarfare was a word rarely used in the West – and definitely unheard of in China, which was just taking it’s first steps in the Internet. Two Chinese military officers, veterans of the semi-conflict with Taiwan, helped shape the role of cyber in modern warfare in China and beyond. The post China’s Unrestricted Warfare, Part 1 appeared first on Malicious Life.
24 minutes | 20 days ago
Can Nuclear Power Plants Be Hacked?
Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, speaks to Sr. Producer Nate Nelson about the cybersecurity of Nuclear facilities. How protected are modern nuclear power plants? The post Can Nuclear Power Plants Be Hacked? appeared first on Malicious Life.
40 minutes | a month ago
Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side]
Chris Wysopal (aka WeldPond), a cyber security pioneer and one of L0pht’s founding members, talks about the group’s 1998 testimony in the Senate, how they used shaming to force corporations to fix their software, and the (not so fortunate) consequences of the sale to @stake. The post Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side] appeared first on Malicious Life.
45 minutes | a month ago
‘L0pht’, Part 2 – The End
In the early days, the L0pht guys tinkered with what they already had laying around, or could find dumpster diving. But things change, of course. By the end of the ‘90s many of the L0pht hackers had quit their day jobs, incorporating under the name “L0pht Heavy Industries” and moving into a nicer space, the “new L0pht.” Seven days after Y2K, they merged with @stake, an internet security startup. It was a signal that hacking wasn’t just for the kids anymore. The post ‘L0pht’, Part 2 – The End appeared first on Malicious Life.
39 minutes | a month ago
The Story of ‘L0pht’, Part 1
‘L0pht’, or ‘L0pht Heavy Indutries’, was one of the most infuencial hacker collectives of the 90’s: it’s members were even invited to testify infront of the Congress on the current state of Internet security. In this episode, four L0pht’s founding members – Count Zero, Weld Pond, Kingpin & Dildog – talk about the begining and influence of the L0pht on cyber security. The post The Story of ‘L0pht’, Part 1 appeared first on Malicious Life.
24 minutes | 2 months ago
The MS Exchange Hack [ML B-Side]
Israel Barack, Cybereason’s CISO and an expert on cyber-warfare, on the recent MS Exchange hack that hit thousands of organizations worldwide: what happened, what were the vulenrabilites expolited in the attack – and what can we do to defend against such attacks in the future. The post The MS Exchange Hack [ML B-Side] appeared first on Malicious Life.
26 minutes | 2 months ago
NotPetya, Part 2
When the NotPetya pandemic hit, Cyber Analyst Amit Serper was sitting in his parents’ living room, getting ready to go out with a few friends. He didn’t have most of his tools with him, but he nonetheless took a swipe at the malware. An hour later, he held the precious vaccine. The post NotPetya, Part 2 appeared first on Malicious Life.
33 minutes | 2 months ago
NotPetya, Part 1
On June 28th, 2017, millions of Ukranians were celebrating ‘Constitution Day.’ Their national holiday turned into a nightmare, as tens of thousands of computers all over the country were infected by a mysterious malware. By that afternoon, the cyber-pandemic was already going global. The post NotPetya, Part 1 appeared first on Malicious Life.
32 minutes | 3 months ago
Facial Recognition in Law Enforcement, Pt. 2
It seems likely that legislation alone won’t be able to regulate the widespread use of facial recognition. Andrew Maximov, who uses AI to fight Belarus’s dictatorship, shows us another way facical recognition can be used – this time for us, instead of against us. The post Facial Recognition in Law Enforcement, Pt. 2 appeared first on Malicious Life.
49 minutes | 3 months ago
Should Law Enforcement Use Facial Recognition? Pt. 1
There are plenty of reasons why Police should use AI for facial recognition: after all, Humans are notoriously bad eye witnesses. However, placing AI in the hands of law enforcement does have its dangers – due to the limitations of the technology itself, and the biases of the officers who use it. The post Should Law Enforcement Use Facial Recognition? Pt. 1 appeared first on Malicious Life.
45 minutes | 4 months ago
Clearview AI scrapes billions of images off social media and the open web, applies facial recognition algorithms on them – and sells that data to law enforcement agencies all over the world. But who are the people behind this secretive company, and what did a breach into its databases reveal? The post Clearview AI appeared first on Malicious Life.
35 minutes | 4 months ago
Breaking Into Secure Buildings
FC, aka ‘Freaky Clown’, is an expert in “Physical assessments” – otherwise known as breaking into ultra-secure office buildings. FC shares some of his (incredible) adventures, as well as some tips and tricks on how to protect your organization’s HQ from hackers such as himself. The post Breaking Into Secure Buildings appeared first on Malicious Life.
35 minutes | 4 months ago
Special: The SolarWinds Hack
Ran talks to Israel Barak, Cybereason’s CISO and a Cyber-defense and Warfare expert, about the recent SolarWinds hack that impacted upto 18,000(!) enterprise organizations in the US. What is a Supply Chain Attack, how can organizations defend against it – and what does all this have to do with Evolution and Natural Selection?… The post Special: The SolarWinds Hack appeared first on Malicious Life.
42 minutes | 5 months ago
EP. 100: Best Stories You Missed
For our 100th episode, we bring you three stories that tie in to previous episodes of the show: Shadow Inc. (Election Hacking), J&K (Max Headroom) and T-Shirt-Gate (Yahoo’s Ugly Death). Enjoy The post EP. 100: Best Stories You Missed appeared first on Malicious Life.
55 minutes | 5 months ago
Jan Sloot’s Incredible Data Compression System
In the mid-90’s, a Dutch TV repairman claimed he invented a revolutionary data compression technology that could compress a full-length movie into just 8KB. The post Jan Sloot’s Incredible Data Compression System appeared first on Malicious Life.
42 minutes | 6 months ago
Op. GUNMAN & The World’s First Keylogger
In 1983, the US got word that an ally’s embassy – probably France’s – was bugged by the Soviets. This reports triggered Operation GUNMAN: a complete removal & de-bugging of *all* electronic devices in the US embassy in the USSR. This secretive operation resulted in a surprising discovery – and made the NSA what it is today. The post Op. GUNMAN & The World’s First Keylogger appeared first on Malicious Life.
42 minutes | 6 months ago
Election Hacking, Part 2
Georgia’s elections infrastructure had been hacked multiple times since 2014 – both by Russian Intelligence and local White Hat hackers. The upcoming elections are plagued with uncertainty – and uncertainty and democracy go together like wet hands and electrical outlets. The post Election Hacking, Part 2 appeared first on Malicious Life.
37 minutes | 7 months ago
Election Hacking, Part 1
In this episode we’re talking about just one state. One which, depending on which way it leans, might bring the entire electoral college with it. One which, as of this writing, is absolutely, positively, neck and neck. Dead heat. A few votes one way or the other could swing it. In other words: this is the kind of state that cannot afford to be hacked. But might be. The post Election Hacking, Part 1 appeared first on Malicious Life.
25 minutes | 7 months ago
MDR Vs. The TrickBot Gang
About a year ago, Cybereason’s Managed Detection and Response team (aka MDR) stumbled upon a attack involving Russian cybercriminals, POS devices and an entire new family of previously undiscovered malware. The post MDR Vs. The TrickBot Gang appeared first on Malicious Life.
Terms of Service
Do Not Sell My Personal Information
© Stitcher 2021