Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Defeating Little Brother requires a new outlook on privacy: Lock and Code S04E23
|
Nov 06, 2023 |
MGM attack is too late a wake-up call for businesses, says James Fair
|
Oct 23, 2023 |
AI sneak attacks, location spying, and definitely not malware, or, what one teenager fears online
|
Oct 09, 2023 |
What does a car need to know about your sex life?
|
Sep 25, 2023 |
Re-air: What teenagers face growing up online
|
Sep 11, 2023 |
"An influx of Elons," a hospital visit, and magic men: Becky Holmes shares more romance scams
|
Aug 28, 2023 |
A new type of "freedom," or, tracking children with AirTags, with Heather Kelly
|
Aug 14, 2023 |
How Apple fixed what Microsoft hasn't, with Thomas Reed
|
Jul 31, 2023 |
Spy vs. spy: Exploring the LetMeSpy hack, with maia arson crimew
|
Jul 17, 2023 |
Of sharks, surveillance, and spied-on emails: This is Section 702, with Matthew Guariglia
|
Jul 03, 2023 |
Why businesses need a disinformation defense plan, with Lisa Kaplan: Lock and Code S04E13
|
Jun 19, 2023 |
Trusting AI not to lie: The cost of truth
|
Jun 05, 2023 |
Identity crisis: How an anti-porn crusade could jam the Internet, featuring Alec Muffett
|
May 22, 2023 |
The rise of "Franken-ransomware," with Allan Liska
|
May 08, 2023 |
Removing the human: When should AI be used in emotional crisis?
|
Apr 24, 2023 |
How the cops buy a "God view" of your location data, with Bennett Cyphers
|
Apr 10, 2023 |
Solving the password’s hardest problem with passkeys, featuring Anna Pobletts
|
Mar 27, 2023 |
"Brad Pitt," a still body, ketchup, and a knife, or the best trick ever played on a romance scammer, with Becky Holmes
|
Mar 13, 2023 |
Fighting censorship online, or, encryption’s latest surprise use-case, with Mallory Knodel
|
Feb 27, 2023 |
What is AI ”good” at (and what the heck is it, actually), with Josh Saxe
|
Feb 13, 2023 |
A private moment, caught by a Roomba, ended up on Facebook. Eileen Guo explains how
|
Jan 30, 2023 |
Fighting tech’s gender gap with TracketPacer
|
Jan 16, 2023 |
Why does technology no longer excite?
|
Jan 01, 2023 |
Chasing cryptocurrency through cyberspace, with Brian Carter
|
Dec 19, 2022 |
Security advisories are falling short. Here’s why, with Dustin Childs
|
Dec 05, 2022 |
Threat hunting: How MDR secures your business
|
Nov 21, 2022 |
How student surveillance fails everyone
|
Nov 07, 2022 |
A gym heist in London goes cyber
|
Oct 24, 2022 |
Teen talk: What it’s like to grow up online, and the role of parents
|
Oct 10, 2022 |
Calling in the ransomware negotiator, with Kurtis Minder
|
Sep 26, 2022 |
The MSP playbook on deciphering tech promises and shaping security culture
|
Sep 12, 2022 |
Playing Doom on a John Deere tractor with Sick Codes
|
Aug 29, 2022 |
Donut breach: Lessons from pen-tester Mike Miller
|
Aug 15, 2022 |
Have we lost the fight for data privacy?
|
Jul 31, 2022 |
Roe v. Wade: How the cops can use your data
|
Jul 17, 2022 |
When good-faith hacking gets people arrested, with Harley Geiger
|
Jul 04, 2022 |
Securing the software supply chain, with Kim Lewandowski
|
Jun 20, 2022 |
Tor’s (security) role in the future of the Internet, with Alec Muffett
|
Jun 06, 2022 |
Hunting down your data with Whitney Merrill
|
May 23, 2022 |
Recovering from romance scams with Cindy Liebes
|
May 09, 2022 |
Why software has so many vulnerabilities, with Tanya Janca
|
Apr 25, 2022 |
Why data protection and privacy are not the same, and why that matters
|
Apr 11, 2022 |
Telling important stories securely, with Runa Sandvik
|
Mar 28, 2022 |
De-Googling Carey Parker’s (and your) life
|
Mar 14, 2022 |
How Crisis Text Line crossed the line in the public’s mind
|
Feb 28, 2022 |
The world’s most coveted spyware, Pegasus
|
Feb 14, 2022 |
How a few PhD students revealed that phishing trainings might just not work
|
Jan 31, 2022 |
Why we don’t patch, with Jess Dodson
|
Jan 18, 2022 |
What angered us most about cybersecurity in 2021
|
Jan 03, 2022 |
Everything you always wanted to know about NFTs (but were too afraid to ask)
|
Dec 20, 2021 |
Why Macs are the best, according to Mac expert Thomas Reed
|
Dec 06, 2021 |
The Internet is not safe enough for women, and Sue Krautbauer has some ideas about why
|
Nov 22, 2021 |
Why we fail at getting the cybersecurity basics right, with Jess Dodson
|
Nov 08, 2021 |
Beyond the VPN: Ultimate online privacy, with The Tor Project’s Isabela Bagueros
|
Oct 25, 2021 |
ExpressVPN made a choice, and so have I
|
Oct 12, 2021 |
Teaching cybersecurity skills to special needs children with Alana Robinson
|
Sep 27, 2021 |
Backups are not a simple ransomware defense, with Matt Crape
|
Sep 13, 2021 |
Hackers, tractors, and a few delayed actors. How hacker Sick Codes learned too much about John Deere
|
Aug 30, 2021 |
Katie Moussouris hacked Clubhouse. Her emails went unanswered for weeks
|
Aug 16, 2021 |
Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”
|
Aug 02, 2021 |
“Seven or eight” zero-days: The failed race to fix Kaseya VSA, with Victor Gevers
|
Jul 19, 2021 |
Racing against a real-life ransomware attack, with Ski Kacoroski
|
Jul 06, 2021 |
Want to stop ransomware attacks? Send the cybercriminals to jail, says Brian Honan
|
Jun 21, 2021 |
Can two VPN "wrongs" make a right?
|
Jun 07, 2021 |
Shining a light on dark patterns with Carey Parker
|
May 24, 2021 |
Alleviating ransomware's legal headaches with Jake Bernstein
|
May 10, 2021 |
Breaking free from the VirusTotal silo
|
Apr 26, 2021 |
Beating security fatigue with Troy Hunt, Chloé Messdaghi, and Tanya Janca
|
Apr 12, 2021 |
Why you need to trust your VPN, with JP Taggart
|
Mar 29, 2021 |
The Malwarebytes 2021 State of Malware report
|
Mar 15, 2021 |
Defending online anonymity and speech with Eva Galperin
|
Mar 01, 2021 |
Talking Emotet's takedown with Adam Kujawa
|
Feb 15, 2021 |
Celebrating Data Privacy Day with Mozilla, DuckDuckGo, and EFF
|
Jan 28, 2021 |
Lesson planning your school's cybersecurity with Doug Levin
|
Dec 07, 2020 |
Tracking the charities that track you online with Chris Boyd
|
Nov 23, 2020 |
Forecasting IoT cybersecurity with John Donovan and Adam Kujawa
|
Nov 10, 2020 |
Finding consumer value in Cybersecurity Awareness Month with Jamie Court
|
Oct 26, 2020 |
Discussing journalism's role in cybersecurity with Seth Rosenblatt and Alfred Ng
|
Oct 12, 2020 |
Investigating digital vulnerabilities in our physical world with Samy Kamkar
|
Sep 28, 2020 |
Safely using Google Chrome Extensions with Pieter Arntz
|
Sep 14, 2020 |
Uncovering security hubris with Adam Kujawa
|
Aug 31, 2020 |
Monitoring the safety of parental monitoring apps with Emory Roane
|
Aug 17, 2020 |
Pinpointing identity and access management's future with Chuck Brooks
|
Aug 03, 2020 |
Locating concerns of Bluetooth and beacon technology with Chris Boyd
|
Jul 20, 2020 |
Pulling apart the Internet of Things with JP Taggart
|
Jul 07, 2020 |
Strengthening and forgetting passwords with Matt Davey and Kyle Swank
|
Jun 21, 2020 |
Securely working from home (WFH) with John Donovan and Adam Kujawa
|
Jun 08, 2020 |
Sounding the trumpet on web browser privacy with Pieter Arntz
|
May 26, 2020 |
Recognizing facial recognition's flaws with Chris Boyd
|
May 11, 2020 |
Mythbusting and evaluating VPNs with JP Taggart
|
Apr 27, 2020 |
Coronavirus and responding to computer viruses with Akshay Bhargava
|
Apr 13, 2020 |
Data privacy with Adam Kujawa
|
Mar 30, 2020 |
On the challenges of managed service providers
|
Mar 16, 2020 |
RSA Conference with Britta Glade
|
Mar 02, 2020 |
Introducing Lock and Code, a Malwarebytes podcast on cybersecurity
|
Feb 21, 2020 |