Start tilbuddet
Lydbøger
E-bøger
Bogserier
Kategorier
Studierabat
Butik
Log Ind
Lydbøger
E-bøger
Bogserier
Kategorier
Studierabat
Butik
Log Ind
Start tilbuddet
Hjem
Malicious Life
Bøger fra Malicious Life
Weev, Part 2
Malicious Life
Ghost In The Machine
Malicious Life
The Dark Avenger
Malicious Life
Spam Empire
Malicious Life
Big Cannons
Malicious Life
The Roots of Evil
Malicious Life
Hell to Pay
Malicious Life
Stuxnet, part 1
Malicious Life
Stuxnet, part 2
Malicious Life
Stuxnet, part 3
Malicious Life
The Whistleblowers
Malicious Life
The Propaganda
Malicious Life
The Soldiers of North Korea
Malicious Life
Weapons of Mass Disruption
Malicious Life
Deception
Malicious Life
Amit Serper Interview- Holiday Special Episode
Malicious Life
Friend or Foe
Malicious Life
The Trojan Horse Affair
Malicious Life
Super Spies
Malicious Life
Cyber Terrorism
Malicious Life
Hack Back
Malicious Life
Fancy Bear, Cozy Bear
Malicious Life
The Legalities of the Cyber War
Malicious Life
The Half Life 2 Hack
Malicious Life
The Morris Worm Pt. 1
Malicious Life
The Morris Worm Pt. 2
Malicious Life
GhostNet
Malicious Life
The Melissa Virus
Malicious Life
Shamoon – The Biggest Hack In History
Malicious Life
The Stuxnet Virus Pt. 1
Malicious Life
The Stuxnet Virus Pt. 2
Malicious Life
The Stuxnet Virus Pt. 3
Malicious Life
WoW: Corrupted Blood
Malicious Life
The Target Hack
Malicious Life
Interview Special: Graham Cluley
Malicious Life
The Ashley Madison Hack, Part 2
Malicious Life
China Vs. Github
Malicious Life
Gene Spafford on the Morris Worm & Cyber-security in the 1980’s
Malicious Life
The Jerusalem Virus, Part 1
Malicious Life
The Jerusalem Virus, Part 2
Malicious Life
The Ethereum DAO Hack
Malicious Life
Dave Kennedy: The Psychological Principles of Social Engineering
Malicious Life
Black Duck Eggs: Darknet Diaries
Malicious Life
The Fall Of Mt. Gox – Part 1
Malicious Life
The Location Data Brokers – A CYBER Podcast Special
Malicious Life
The Fall Of Mt. Gox – Part 2
Malicious Life
Marconi & The Maskelyne Affair
Malicious Life
DeCSS: Hackers Vs Hollywood
Malicious Life
The Equifax Data Breach Pt. I: A Big Data Bubble
Malicious Life
The Equifax Data Breach Pt. II: The Bits Hit The Fan
Malicious Life
The WANK Worm, Part 1
Malicious Life
The WANK Worm, Part 2
Malicious Life
The U.S vs. Gary McKinnon
Malicious Life
'Pa Bell' Vs. Youth International Party Line
Malicious Life
Operation SoftCell
Malicious Life
ML_Conficker
Malicious Life
EP53: Are Ad Blockers Malicious?
Malicious Life
Responding to a Cyber Attack with Missiles
Malicious Life
EP55: Operation Aurora, Part 1
Malicious Life
EP56: Operation Aurora, Part 2
Malicious Life
EP57: Listeners Survey Special
Malicious Life
EP58: How is Spyware Legal?
Malicious Life
EP59: Gozi, Part 1: The Rise of Malware-as-a-Service
Malicious Life
EP60: ML B-Side: Lodrian Cherne On Stalkerware
Malicious Life
EP61: Prying Eyes
Malicious Life
Gozi Part 2
Malicious Life
Gozi B-Side: Amit Serper & Sam Curry
Malicious Life
What's the problem with Cyber Insurance?
Malicious Life
Human Side Channels
Malicious Life
Sam Curry: The 2020 Crystal Ball
Malicious Life
GAN and Deep Fakes, Part 1
Malicious Life
Dead Drops
Malicious Life
Triton Part 1
Malicious Life
Triton, Part 2: The World’s Most Dangerous Malware
Malicious Life
How To Defend A Bank, Part 1: Fusion Centers
Malicious Life
How To Defend A Bank, Pt. II: Right of Bang
Malicious Life
ToTok, Part 1: How to Convince Someone to Download Spyware
Malicious Life
ToTok, Part 2: The Masterminds of Mobile Malware
Malicious Life
Operation Glowing Symphony
Malicious Life
ToTok, Part 3: Becoming a Spyware Superpower
Malicious Life
The Max Headroom Signal Hijack
Malicious Life
The Huawei Ban, Part 1
Malicious Life
The Hauwei Ban, Part 2
Malicious Life
Steven Wozniak Interview, Deep 2017
Malicious Life
The Problem With Passwords
Malicious Life
Maintaining Secure Business Continuity With A Remote Workforce - With Sam Curry
Malicious Life
No Honor Among Thieves
Malicious Life
SegWit2x, or - The Year Bitcoiners Will Never Forget, Part 1
Malicious Life
Hacking Fortnite Accounts (CPRadio)
Malicious Life
SegWit2x Part 2
Malicious Life
SegWit2x, Part 3
Malicious Life
From Ransomware To Blackmail, With Assaf Dahan
Malicious Life
Protecting The Panama Papers Whistleblower
Malicious Life
Multi-Stage Ransomware (Live)
Malicious Life
Troy Hunt - Interview
Malicious Life
The Great Firewall of China - Part 1
Malicious Life
The Great Firewall of China, Pt. 2: Cisco's Trial
Malicious Life
Yahoo's Ugly Death, Part 1
Malicious Life
Yahoo's Ugly Death, Part 2
Malicious Life
MDR Vs. The TrickBot Gang
Malicious Life
Election Hacking, Part 1
Malicious Life
Election Hacking, Part 2
Malicious Life
Op. GUNMAN & The World's First Keylogger
Malicious Life
Jan Sloot's Incredible Digital Coding System
Malicious Life
100th Episode Special
Malicious Life
Special: The Solarwinds Hack
Malicious Life
Breaking Into Buildings
Malicious Life
Clearview AI
Malicious Life
Should Law Enforcement Use Facial Recognition? Pt. 1
Malicious Life
Facial Recognition in Law Enforcment, Part 2
Malicious Life
NotPetya Part 1
Malicious Life
NotPetya Part 2
Malicious Life
MS Exchange Hack [ML B-Side]
Malicious Life
The Story of 'L0pht', Part 1
Malicious Life
L0pht, Part 2
Malicious Life
Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]
Malicious Life
Can Nuclear Power Plants Be Hacked?
Malicious Life
China's Unrestricted Warfare, Part 1
Malicious Life
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]
Malicious Life
China's Unrestricted Warfare, Part 2
Malicious Life
RSA Breach: The Untold Story, Part 1
Malicious Life
RSA Breach, Part 2
Malicious Life
Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]
Malicious Life
China's Unrestricted Warfare, Part 3
Malicious Life
THOTCON Hacking Conference [ML BSide]
Malicious Life
Albert Gonzales, Part 1
Malicious Life
Jeff Moss: DEF CON [ML B-Side]
Malicious Life
Albert Gonzalez, Part 2
Malicious Life
DerbyCon - Dave Kennedy [ML B-Side]
Malicious Life
Albert Gonzalez, Part 3
Malicious Life
The State of Credit Card Security [ML B-Side]
Malicious Life
The Jester
Malicious Life
DeadRinger [ML B-Side]
Malicious Life
RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]
Malicious Life
John McAfee
Malicious Life
Understanding China [ML B-Side]
Malicious Life
The Tesla Hack
Malicious Life
Jack Rhysider, Darknet Diaries [ML B-Side]
Malicious Life
Should The U.S. Ban Chinese and Russian Technology?
Malicious Life
The MITRE ATT&CK Framework
Malicious Life
Smart TVs: A New Battlefield
Malicious Life
Operation GhostShell
Malicious Life
Marcus Hutchins - An Accidental Hero
Malicious Life
In Defence Of the NSA [ML B-Side]
Malicious Life
Operation Flyhook, Part 1
Malicious Life
IP Hijacking [ML BSide]
Malicious Life
Operation Flyhook, Part 2
Malicious Life
Wild West Hackin' Fest [ML BSide]
Malicious Life
Tay: A Teenage Bot Gone Rogue
Malicious Life
Ransomware Attackers Don’t Take Holidays [ML B-Side]
Malicious Life
Shawn Carpenter: A Cyber Vigliante
Malicious Life
A digital 'vaccine' for Log4Shell [ML BSide]
Malicious Life
Is Code === Free Speech?
Malicious Life
How the Internet Changed the NSA
Malicious Life
The Mystery of Cicada 3301
Malicious Life
Hacker Highschool: Pete Herzog [ML BSide]
Malicious Life
The Bloody Origins of Israel's Cyber Security Industry
Malicious Life
Why aren't SMBs investing in Cyber Security? [ML B-Side]
Malicious Life
Crypto AG - The Greatest Espionage Operation Ever, Part 1
Malicious Life
Why do APTs use Ransomeware? [ML BSide]
Malicious Life
Crypto AG, Part 2: The Death of Bo Jr.
Malicious Life
Quantum Cyber Security [ML BSide]
Malicious Life
Crypto AG, Part 3: The Truth Is Revealed
Malicious Life
How Resiliant Is Our Banking System? [ML BSide]
Malicious Life
How Resilient Is Our Banking System?
Malicious Life
Cyber PTSD
Malicious Life
DIE - A New Paragidm for Cyber Security [ML B-Side]
Malicious Life
Chris Roberts: Hackers on a Plane
Malicious Life
The Russia-Ukraine Cyberwar [ML B-Side]
Malicious Life
Aaron Swartz
Malicious Life
MITRE Attack Flow [ML B-Sides]
Malicious Life
Op. Sundevil And The Birth of the EFF
Malicious Life
How to Russia-Proof Your Democracy [ML BSide]
Malicious Life
Operation CuckooBees [ML B-Side]
Malicious Life
What The LinkedIn Hack Taught Us About Storing Passwords
Malicious Life
Catching A Cybercriminal [ML B-Side]
Malicious Life
Hackers vs. Spies: The Stratfor Leaks, Pt. 1
Malicious Life
Hackers vs. Spies: The Stratfor Leaks, Pt. 2
Malicious Life
Malicious LIVE: Celebrating 5 Years of Malicious Life
Malicious Life
The “Cypherpunks” Who Invented Private Digital Money
Malicious Life
Jacob Goldstein: The Future of BitCoin [ML BSide]
Malicious Life
Silk Road: The Amazon of drugs, Part 1
Malicious Life
Kurtis Minder: Ransomware Negotiations [ML BSide]
Malicious Life
Silk Road, The Amazon of Drugs - Part 2
Malicious Life
Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]
Malicious Life
“Designed by criminals, for criminals”: Operation Trojan Shield
Malicious Life
"A CISO's Nightmare": Israel Baron on Railway Secuirty
Malicious Life
Leo Kuvayev– The Czar of Spammers
Malicious Life
Software Bill of Materials (SBOMs) [ML BSide]
Malicious Life
Hacking Language Models
Malicious Life
Hacking Multi-Factor Authentication
Malicious Life
"King Kimble": Kim DotCom
Malicious Life
What’s it's Like to Fight LulzSec [ML B-Side]
Malicious Life
Hacking Stock Markets, Part 1
Malicious Life
Vishing: Voice Scams [ML BSide]
Malicious Life
Hacking Stock Markets, Part 2
Malicious Life
What Would Happen if CBS Got Hacked? [ML BSide]
Malicious Life
LabMD Vs. The FTC
Malicious Life
What can Chess grandmasters teach us about Cyber? [ML BSide]
Malicious Life
The Russian Business Network
Malicious Life
Jailbreaking Tractors [ML BSide]
Malicious Life
Norse Corp.: How To NOT build a cybersecurity startup
Malicious Life
The Problem With Kernel-Mode Anti-Cheat Software
Malicious Life
Thamar Reservoir
Malicious Life
Fred Cohen: The Godfather of Computer Viruses [ML B-Side]
Malicious Life
How Netflix Learned Cloud Security
Malicious Life
Cyberbunker, Part 1
Malicious Life
Cyberbunker, Part 2
Malicious Life
FBI vs. REvil [ML BSide]
Malicious Life
You Should Be Afraid of SIM Swaps
Malicious Life
SIM Swapping Follow Up [ML B-Side]
Malicious Life
The (Other) Problem with NFTs
Malicious Life
Why Do NFTs Disappear? [ML BSide]
Malicious Life
Operation Ivy Bells
Malicious Life
Russian Propaganda, Explained [ML B-Side]
Malicious Life
The Lawerence Berkeley Hack, Part 1
Malicious Life
The Lawerence Berkeley Hack, Part 2
Malicious Life
Olympic Destroyer
Malicious Life
How Entire Countries Can Lose the Internet
Malicious Life
The Reason You Don’t Have Data Privacy
Malicious Life
The Economics Of Cybersecurity
Malicious Life
Ad Fraud, Part 1
Malicious Life
Ad Fraud, Part 2
Malicious Life
Sony BMG's Rootkit Fiasco
Malicious Life
Roman Seleznev: Did the Punishment Fit the Crime?
Malicious Life
The Voynich Manuscript
Malicious Life
Why aren't there more bug bounty programs?
Malicious Life
Is Generative AI Dangerous?
Malicious Life
Can We Stop the AI Cyber Threat?
Malicious Life
Operation Kudo
Malicious Life
Silent Firewalls: The Underrepresentation of Women in Cyber
Malicious Life
Should You Pay Ransomware Attackers? A Game Theory Approach
Malicious Life
Is NSO Evil? Part 1
Malicious Life
Is NSO Evil? Part 2
Malicious Life
Volt Typhoon
Malicious Life
Moonlight Maze
Malicious Life
How to Hack Into Satellites
Malicious Life
The Real Story of Citibank’s $10M Hack
Malicious Life
The Mariposa Botnet
Malicious Life
SIM Registration: Security, or Surveillance?
Malicious Life
Kevin Mitnick, Part 1
Malicious Life
Kevin Mitnick, Part 2
Malicious Life
Can You Bomb a Hacker?
Malicious Life
The Y2K Bug, Part 1
Malicious Life
The Y2K Bug, Part 2
Malicious Life
The Source Code of Malicious Life
Malicious Life
Unmasking Secrets: The Rise of Open-Source Intelligence
Malicious Life
The Nigerian Prince
Malicious Life
What Happened at Uber?
Malicious Life
Section 230: The Law that Makes Social Media Great, and Terrible
Malicious Life
Viser 250 ud af 263 elementer
Vis mere
Læs mere
Om Mofibo
Jobs
nye app-funktioner
Investor Relations
Presse
Bæredygtighed
Tilgængelighedserklæring
Whistleblow
Udforsk
Søg
Bøger
Bogserier
Mofibo Originals
Podcasts
Forfattere
Indlæsere
Kategorier
Brugbare links
Hjælpecenter
Abonnementer
Køb gavekort
Indløs gavekort
Indløs kampagnekode
Studierabat
Sprog og region
Dansk
Danmark
Følg os
Privatlivspolitik
Medlemsvilkår
Cookies