Lock and Code

By Malwarebytes

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Malwarebytes

Category: Technology

Open in Apple Podcasts

Open RSS feed

Open Website

Rate for this podcast

Subscribers: 63
Reviews: 0
Episodes: 95


Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.

Episode Date
Defeating Little Brother requires a new outlook on privacy: Lock and Code S04E23
Nov 06, 2023
MGM attack is too late a wake-up call for businesses, says James Fair
Oct 23, 2023
AI sneak attacks, location spying, and definitely not malware, or, what one teenager fears online
Oct 09, 2023
What does a car need to know about your sex life?
Sep 25, 2023
Re-air: What teenagers face growing up online
Sep 11, 2023
"An influx of Elons," a hospital visit, and magic men: Becky Holmes shares more romance scams
Aug 28, 2023
A new type of "freedom," or, tracking children with AirTags, with Heather Kelly
Aug 14, 2023
How Apple fixed what Microsoft hasn't, with Thomas Reed
Jul 31, 2023
Spy vs. spy: Exploring the LetMeSpy hack, with maia arson crimew
Jul 17, 2023
Of sharks, surveillance, and spied-on emails: This is Section 702, with Matthew Guariglia
Jul 03, 2023
Why businesses need a disinformation defense plan, with Lisa Kaplan: Lock and Code S04E13
Jun 19, 2023
Trusting AI not to lie: The cost of truth
Jun 05, 2023
Identity crisis: How an anti-porn crusade could jam the Internet, featuring Alec Muffett
May 22, 2023
The rise of "Franken-ransomware," with Allan Liska
May 08, 2023
Removing the human: When should AI be used in emotional crisis?
Apr 24, 2023
How the cops buy a "God view" of your location data, with Bennett Cyphers
Apr 10, 2023
Solving the password’s hardest problem with passkeys, featuring Anna Pobletts
Mar 27, 2023
"Brad Pitt," a still body, ketchup, and a knife, or the best trick ever played on a romance scammer, with Becky Holmes
Mar 13, 2023
Fighting censorship online, or, encryption’s latest surprise use-case, with Mallory Knodel
Feb 27, 2023
What is AI ”good” at (and what the heck is it, actually), with Josh Saxe
Feb 13, 2023
A private moment, caught by a Roomba, ended up on Facebook. Eileen Guo explains how
Jan 30, 2023
Fighting tech’s gender gap with TracketPacer
Jan 16, 2023
Why does technology no longer excite?
Jan 01, 2023
Chasing cryptocurrency through cyberspace, with Brian Carter
Dec 19, 2022
Security advisories are falling short. Here’s why, with Dustin Childs
Dec 05, 2022
Threat hunting: How MDR secures your business
Nov 21, 2022
How student surveillance fails everyone
Nov 07, 2022
A gym heist in London goes cyber
Oct 24, 2022
Teen talk: What it’s like to grow up online, and the role of parents
Oct 10, 2022
Calling in the ransomware negotiator, with Kurtis Minder
Sep 26, 2022
The MSP playbook on deciphering tech promises and shaping security culture
Sep 12, 2022
Playing Doom on a John Deere tractor with Sick Codes
Aug 29, 2022
Donut breach: Lessons from pen-tester Mike Miller
Aug 15, 2022
Have we lost the fight for data privacy?
Jul 31, 2022
Roe v. Wade: How the cops can use your data
Jul 17, 2022
When good-faith hacking gets people arrested, with Harley Geiger
Jul 04, 2022
Securing the software supply chain, with Kim Lewandowski
Jun 20, 2022
Tor’s (security) role in the future of the Internet, with Alec Muffett
Jun 06, 2022
Hunting down your data with Whitney Merrill
May 23, 2022
Recovering from romance scams with Cindy Liebes
May 09, 2022
Why software has so many vulnerabilities, with Tanya Janca
Apr 25, 2022
Why data protection and privacy are not the same, and why that matters
Apr 11, 2022
Telling important stories securely, with Runa Sandvik
Mar 28, 2022
De-Googling Carey Parker’s (and your) life
Mar 14, 2022
How Crisis Text Line crossed the line in the public’s mind
Feb 28, 2022
The world’s most coveted spyware, Pegasus
Feb 14, 2022
How a few PhD students revealed that phishing trainings might just not work
Jan 31, 2022
Why we don’t patch, with Jess Dodson
Jan 18, 2022
What angered us most about cybersecurity in 2021
Jan 03, 2022
Everything you always wanted to know about NFTs (but were too afraid to ask)
Dec 20, 2021
Why Macs are the best, according to Mac expert Thomas Reed
Dec 06, 2021
The Internet is not safe enough for women, and Sue Krautbauer has some ideas about why
Nov 22, 2021
Why we fail at getting the cybersecurity basics right, with Jess Dodson
Nov 08, 2021
Beyond the VPN: Ultimate online privacy, with The Tor Project’s Isabela Bagueros
Oct 25, 2021
ExpressVPN made a choice, and so have I
Oct 12, 2021
Teaching cybersecurity skills to special needs children with Alana Robinson
Sep 27, 2021
Backups are not a simple ransomware defense, with Matt Crape
Sep 13, 2021
Hackers, tractors, and a few delayed actors. How hacker Sick Codes learned too much about John Deere
Aug 30, 2021
Katie Moussouris hacked Clubhouse. Her emails went unanswered for weeks
Aug 16, 2021
Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”
Aug 02, 2021
“Seven or eight” zero-days: The failed race to fix Kaseya VSA, with Victor Gevers
Jul 19, 2021
Racing against a real-life ransomware attack, with Ski Kacoroski
Jul 06, 2021
Want to stop ransomware attacks? Send the cybercriminals to jail, says Brian Honan
Jun 21, 2021
Can two VPN "wrongs" make a right?
Jun 07, 2021
Shining a light on dark patterns with Carey Parker
May 24, 2021
Alleviating ransomware's legal headaches with Jake Bernstein
May 10, 2021
Breaking free from the VirusTotal silo
Apr 26, 2021
Beating security fatigue with Troy Hunt, Chloé Messdaghi, and Tanya Janca
Apr 12, 2021
Why you need to trust your VPN, with JP Taggart
Mar 29, 2021
The Malwarebytes 2021 State of Malware report
Mar 15, 2021
Defending online anonymity and speech with Eva Galperin
Mar 01, 2021
Talking Emotet's takedown with Adam Kujawa
Feb 15, 2021
Celebrating Data Privacy Day with Mozilla, DuckDuckGo, and EFF
Jan 28, 2021
Lesson planning your school's cybersecurity with Doug Levin
Dec 07, 2020
Tracking the charities that track you online with Chris Boyd
Nov 23, 2020
Forecasting IoT cybersecurity with John Donovan and Adam Kujawa
Nov 10, 2020
Finding consumer value in Cybersecurity Awareness Month with Jamie Court
Oct 26, 2020
Discussing journalism's role in cybersecurity with Seth Rosenblatt and Alfred Ng
Oct 12, 2020
Investigating digital vulnerabilities in our physical world with Samy Kamkar
Sep 28, 2020
Safely using Google Chrome Extensions with Pieter Arntz
Sep 14, 2020
Uncovering security hubris with Adam Kujawa
Aug 31, 2020
Monitoring the safety of parental monitoring apps with Emory Roane
Aug 17, 2020
Pinpointing identity and access management's future with Chuck Brooks
Aug 03, 2020
Locating concerns of Bluetooth and beacon technology with Chris Boyd
Jul 20, 2020
Pulling apart the Internet of Things with JP Taggart
Jul 07, 2020
Strengthening and forgetting passwords with Matt Davey and Kyle Swank
Jun 21, 2020
Securely working from home (WFH) with John Donovan and Adam Kujawa
Jun 08, 2020
Sounding the trumpet on web browser privacy with Pieter Arntz
May 26, 2020
Recognizing facial recognition's flaws with Chris Boyd
May 11, 2020
Mythbusting and evaluating VPNs with JP Taggart
Apr 27, 2020
Coronavirus and responding to computer viruses with Akshay Bhargava
Apr 13, 2020
Data privacy with Adam Kujawa
Mar 30, 2020
On the challenges of managed service providers
Mar 16, 2020
RSA Conference with Britta Glade
Mar 02, 2020
Introducing Lock and Code, a Malwarebytes podcast on cybersecurity
Feb 21, 2020