logo
episode-header-image
Mar 2018
33m 58s

Hack Back

Malicious Life
About this episode

Those who have experienced a cybercrime know the feelings of frustration and helplessness that come along with it. A hacker could be halfway across the world when they attack you, and you might have no way of figuring out who it was or catching them even if you could. So frustrating. But is there really nothing we […]

The post Hack Back appeared first on Malicious Life.



Advertising Inquiries: https://redcircle.com/brands
Up next
Dec 2024
Weev, Part 2
The Electronic Frontier Foundation, long time critics of the Computer Fraud and Abuse Act, followed Weev's trial - but did not get involved. For the appeal, however, the organization decided to step it. But althought the EFF had some strong points against the CFAA - the justi ... Show More
28m 49s
Nov 2024
Weev, Part 1
Much like Aaron Swartz did, Andrew "weev" Auernheimer fought against the Computer Fraud and Abuse Act, a law both men belived to be dangerous and unjust. But unlike Swartz, the internet's own boy, weev is an unapologetic troll who spread bile and chaos wherever he goes, a man who ... Show More
29m 56s
Nov 2024
Cuckoo Spear [B-Side]
APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin Ito & Loic Castel, researchers from Cybereason's IR Team, uncovered a new tool ... Show More
30m 43s
Recommended Episodes
Jun 2023
Hacking and cybercrime
Just how safe is the online world? Yale Professor of Law and Philosophy Scott Shapiro delves into cybersecurity in his book, Fancy Bear Goes Phishing. The book’s title derives from the exploits of ‘Fancy Bear’, an elite unit of the Russian military intelligence that hacked the US ... Show More
42m 1s
Nov 2020
The psychology of hacking
Another day, another breach. Organisations are still being hacked by malicious counterparts everyday, and the reason they're always a step ahead is not only gender diversity but a skills diversity as well - meanwhile we're still relying on our IT departments to handle cyber breac ... Show More
23m 59s
Sep 2023
Tech News: Hackers Gotta Hack
Chinese-backed hackers are infiltrating computer systems by compromising routers. Some security researchers say that modern GPUs can steal pixels right off a web site. And Microsoft encounters yet more resistance regarding its acquisition of Activision Blizzard.See omnystudio.com ... Show More
20m 25s
Oct 2020
What are the rules of hacking
We've spoken about the dark side of hacking and we've shown you that hacking can be used for good. But is there a line? And what happens when you cross it? Ex-Hacker and Brand Ambassador of CTRL Group Bastien Treptel is joined by Skeeve Stevens, the first Australian to go to jail ... Show More
29m 25s
Mar 2022
Cryptography vs. Cybercrime
The business of cybercrime is booming, and the people who protect our data are seemingly locked in step with the people who hack it. So today we’re covering historical efforts to safeguard – or steal – our most valuable information online. From ancient cryptographers inspiring ea ... Show More
46m 9s
Nov 2017
Breach disclosure: fast and slow. Mirai's minor comeback. Anti-ISIS Hacktivsts strike Amaq. North Koreans studying blockchain. Alleged Game of Thrones hacker indicted.
In today's podcast, we hear that image-sharing service Imgur disclosed a data breach. It happened sometime ago, but they were quick to get the word out once they were aware of it. Uber faces regulatory attention and possible post-hack headwinds for its aniticipated IPO. Mozilla's ... Show More
15m 21s
Sep 2022
How To Protect Yourself From Social Engineering Hacks
Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ... Show More
29m 32s