¡Disfruta de 1 año de al 25% de dto! ¡Lo quiero!
Malicious Life

Malicious Life 6j52s

Weev, Part 2

The Electronic Frontier Foundation, long time critics of the Computer Fraud and Abuse Act,...

Añadir a ... 

Weev, Part 1

Much like Aaron Swartz did, Andrew "weev" Auernheimer fought against the Computer Fraud...

Añadir a ... 

Cuckoo Spear [B-Side]

APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT...

Añadir a ... 

The Man Who Went To War With Anonymous - And Lost

Aaron Barr was en-signals intelligence officer specializing in analytics. As part of HBGary...

Añadir a ... 

What Can Organizations Learn from "Grim Beeper"? [B-Side]

On 17 and 18 of September 2024, thousands of pagers and hand held radio devices used by...

Añadir a ... 

The Fappening/Celebgate

Could thousands of people keep a secret? Common sense says no—secrets spread, and people talk....

Añadir a ... 

Operation Snow White, Part 2

Scientology spies were trained in all covert operations techniques: surveillance, recruiting...

Añadir a ... 

Operation Snow White, Part 1

In 1963, the FDA raided the headquaters of a budding new and esoteric religion - The Church of...

Añadir a ... 

Caught in the Crossfire: Infighting and Treason in Russia’s Cyber World

On Dec. 5, 2016, two senior Russian Intelligence officers and two civilians were arrested and...

Añadir a ... 

SNAP Fraud: Getting Rich by Stealing from the Poor

SNAP - better known as food stamps - goes back to the Great Depression. ,The physical stamps were...

Añadir a ... 

The Hollywood Con Queen, Part 2

Nicole Kotsianas, an investigator with K2 Intelligence, made it her personal mission to hunt down...

Añadir a ... 

The Hollywood Con Queen, Part 1

In 2015, two aspiring script writers flew to Indonesia to meet with executives of a large Chinese...

Añadir a ... 

The Doomed Queen’s Secret Ciphers

In the pre-internet era, encryption was a matter of life and death, and the motives behind these...

Añadir a ... 

Why Did People Write Viruses In The 80s & 90s?

Why did people write malware in the pre-internet days? Back then, there was no way to make money...

Añadir a ... 

Section 230: The Law that Makes Social Media Great, and Terrible

Section 230 is the pivotal law that has enabled the rise of social media -while sparking heated...

Añadir a ... 

What Happened at Uber?

In 2016, Joe Sullivan, former CISO of Facebook, was at the peak of his career. As Uber's new...

Añadir a ... 

The Nigerian Prince

In this episode of ML, we're exploring the history of the well-known Nigerian Prince scam, also...

Añadir a ... 

Unmasking Secrets: The Rise of Open-Source Intelligence

Dive into the world of open-source intelligence (OSINT) in this episode, where we uncover how...

Añadir a ... 

The Source Code of Malicious Life

A few weeks ago we had a listener’s meetup in New York, and as part of that meetup, I gave a talk...

Añadir a ... 

The Y2K Bug, Part 2

In the waning years of the 20th century, amid growing anxieties about the turn of the millennium,...

Añadir a ...