Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Feb 15, 2024
Episode | Date |
---|---|
How ads weirdly know your screen brightness, headphone jack use, and location, with Tim Shott
|
Mar 09, 2025 |
Surveillance pricing is "evil and sinister," explains Justin Kloczko
|
Feb 23, 2025 |
A suicide reveals the lonely side of AI chatbots, with Courtney Brown
|
Feb 09, 2025 |
Three privacy rules for 2025
|
Jan 26, 2025 |
The new rules for AI and encrypted messaging, with Mallory Knodel
|
Jan 12, 2025 |
Is nowhere safe from AI slop?
|
Dec 29, 2024 |
A day in the life of a privacy pro, with Ron de Jesus
|
Dec 15, 2024 |
These cars want to know about your sex life (re-air)
|
Dec 01, 2024 |
An air fryer, a ring, and a vacuum get brought into a home. What they take out is your data
|
Nov 17, 2024 |
Why your vote can’t be “hacked,” with Cait Conley of CISA
|
Nov 03, 2024 |
This industry profits from knowing you have cancer, explains Cody Venzke
|
Oct 21, 2024 |
Exposing the Facebook funeral livestream scam
|
Oct 07, 2024 |
San Francisco’s fight against deepfake porn, with City Attorney David Chiu
|
Sep 23, 2024 |
What the arrest of Telegram's CEO means, with Eva Galperin
|
Sep 09, 2024 |
Move over malware: Why one teen is more worried about AI (re-air)
|
Aug 26, 2024 |
AI girlfriends want to know all about you. So might ChatGPT
|
Aug 12, 2024 |
SIEM is not storage, with Jess Dodson
|
Jul 29, 2024 |
How an AI “artist” stole a woman’s face, with Ali Diamond
|
Jul 15, 2024 |
Busted for book club? Why cops want to see what you’re reading, with Sarah Lamdan
|
Jul 01, 2024 |
(Almost) everything you always wanted to know about cybersecurity, but were too afraid to ask, with Tjitske de Vries
|
Jun 17, 2024 |
800 arrests, 40 tons of drugs, and one backdoor, or what a phone startup gave the FBI, with Joseph Cox
|
Jun 03, 2024 |
Your vacation, reservations, and online dates, now chosen by AI
|
May 20, 2024 |
"No social media 'til 16," and other fixes for a teen mental health crisis, with Dr. Jean Twenge
|
May 06, 2024 |
Picking fights and gaining rights, with Justin Brookman
|
Apr 22, 2024 |
Porn panic imperils privacy online, with Alec Muffett (re-air)
|
Apr 08, 2024 |
Securing your home network is long, tiresome, and entirely worth it, with Carey Parker
|
Mar 25, 2024 |
Going viral shouldn't lead to bomb threats, with Leigh Honeywell
|
Mar 11, 2024 |
How to make a fake ID online, with Joseph Cox
|
Feb 26, 2024 |
If only you had to worry about malware, with Jason Haddix
|
Feb 12, 2024 |
Bruce Schneier predicts a future of AI-powered mass spying
|
Jan 29, 2024 |
A true tale of virtual kidnapping
|
Jan 15, 2024 |
DNA data deserves better, with Suzanne Bernstein
|
Jan 01, 2024 |
Meet the entirely legal, iPhone-crashing device: the Flipper Zero
|
Dec 18, 2023 |
Why a ransomware gang tattled on its victim, with Allan Liska
|
Dec 04, 2023 |
Defeating Little Brother requires a new outlook on privacy
|
Nov 06, 2023 |
MGM attack is too late a wake-up call for businesses, says James Fair
|
Oct 23, 2023 |
AI sneak attacks, location spying, and definitely not malware, or, what one teenager fears online
|
Oct 09, 2023 |
What does a car need to know about your sex life?
|
Sep 25, 2023 |
Re-air: What teenagers face growing up online
|
Sep 11, 2023 |
"An influx of Elons," a hospital visit, and magic men: Becky Holmes shares more romance scams
|
Aug 28, 2023 |
A new type of "freedom," or, tracking children with AirTags, with Heather Kelly
|
Aug 13, 2023 |
How Apple fixed what Microsoft hasn't, with Thomas Reed
|
Jul 31, 2023 |
Spy vs. spy: Exploring the LetMeSpy hack, with maia arson crimew
|
Jul 17, 2023 |
Of sharks, surveillance, and spied-on emails: This is Section 702, with Matthew Guariglia
|
Jul 03, 2023 |
Why businesses need a disinformation defense plan, with Lisa Kaplan: Lock and Code S04E13
|
Jun 19, 2023 |
Trusting AI not to lie: The cost of truth
|
Jun 05, 2023 |
Identity crisis: How an anti-porn crusade could jam the Internet, featuring Alec Muffett
|
May 22, 2023 |
The rise of "Franken-ransomware," with Allan Liska
|
May 08, 2023 |
Removing the human: When should AI be used in emotional crisis?
|
Apr 24, 2023 |
How the cops buy a "God view" of your location data, with Bennett Cyphers
|
Apr 10, 2023 |
Solving the password’s hardest problem with passkeys, featuring Anna Pobletts
|
Mar 27, 2023 |
"Brad Pitt," a still body, ketchup, and a knife, or the best trick ever played on a romance scammer, with Becky Holmes
|
Mar 13, 2023 |
Fighting censorship online, or, encryption’s latest surprise use-case, with Mallory Knodel
|
Feb 27, 2023 |
What is AI ”good” at (and what the heck is it, actually), with Josh Saxe
|
Feb 13, 2023 |
A private moment, caught by a Roomba, ended up on Facebook. Eileen Guo explains how
|
Jan 30, 2023 |
Fighting tech’s gender gap with TracketPacer
|
Jan 16, 2023 |
Why does technology no longer excite?
|
Jan 01, 2023 |
Chasing cryptocurrency through cyberspace, with Brian Carter
|
Dec 19, 2022 |
Security advisories are falling short. Here’s why, with Dustin Childs
|
Dec 05, 2022 |
Threat hunting: How MDR secures your business
|
Nov 21, 2022 |
How student surveillance fails everyone
|
Nov 07, 2022 |
A gym heist in London goes cyber
|
Oct 24, 2022 |
Teen talk: What it’s like to grow up online, and the role of parents
|
Oct 10, 2022 |
Calling in the ransomware negotiator, with Kurtis Minder
|
Sep 26, 2022 |
The MSP playbook on deciphering tech promises and shaping security culture
|
Sep 12, 2022 |
Playing Doom on a John Deere tractor with Sick Codes
|
Aug 29, 2022 |
Donut breach: Lessons from pen-tester Mike Miller
|
Aug 15, 2022 |
Have we lost the fight for data privacy?
|
Jul 31, 2022 |
Roe v. Wade: How the cops can use your data
|
Jul 17, 2022 |
When good-faith hacking gets people arrested, with Harley Geiger
|
Jul 04, 2022 |
Securing the software supply chain, with Kim Lewandowski
|
Jun 20, 2022 |
Tor’s (security) role in the future of the Internet, with Alec Muffett
|
Jun 06, 2022 |
Hunting down your data with Whitney Merrill
|
May 23, 2022 |
Recovering from romance scams with Cindy Liebes
|
May 09, 2022 |
Why software has so many vulnerabilities, with Tanya Janca
|
Apr 25, 2022 |
Why data protection and privacy are not the same, and why that matters
|
Apr 11, 2022 |
Telling important stories securely, with Runa Sandvik
|
Mar 28, 2022 |
De-Googling Carey Parker’s (and your) life
|
Mar 14, 2022 |
How Crisis Text Line crossed the line in the public’s mind
|
Feb 28, 2022 |
The world’s most coveted spyware, Pegasus
|
Feb 14, 2022 |
How a few PhD students revealed that phishing trainings might just not work
|
Jan 31, 2022 |
Why we don’t patch, with Jess Dodson
|
Jan 18, 2022 |
What angered us most about cybersecurity in 2021
|
Jan 03, 2022 |
Everything you always wanted to know about NFTs (but were too afraid to ask)
|
Dec 20, 2021 |
Why Macs are the best, according to Mac expert Thomas Reed
|
Dec 06, 2021 |
The Internet is not safe enough for women, and Sue Krautbauer has some ideas about why
|
Nov 22, 2021 |
Why we fail at getting the cybersecurity basics right, with Jess Dodson
|
Nov 08, 2021 |
Beyond the VPN: Ultimate online privacy, with The Tor Project’s Isabela Bagueros
|
Oct 25, 2021 |
ExpressVPN made a choice, and so have I
|
Oct 12, 2021 |
Teaching cybersecurity skills to special needs children with Alana Robinson
|
Sep 27, 2021 |
Backups are not a simple ransomware defense, with Matt Crape
|
Sep 13, 2021 |
Hackers, tractors, and a few delayed actors. How hacker Sick Codes learned too much about John Deere
|
Aug 30, 2021 |
Katie Moussouris hacked Clubhouse. Her emails went unanswered for weeks
|
Aug 16, 2021 |
Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”
|
Aug 02, 2021 |
“Seven or eight” zero-days: The failed race to fix Kaseya VSA, with Victor Gevers
|
Jul 19, 2021 |
Racing against a real-life ransomware attack, with Ski Kacoroski
|
Jul 06, 2021 |
Want to stop ransomware attacks? Send the cybercriminals to jail, says Brian Honan
|
Jun 21, 2021 |
Can two VPN "wrongs" make a right?
|
Jun 07, 2021 |
Shining a light on dark patterns with Carey Parker
|
May 24, 2021 |
Alleviating ransomware's legal headaches with Jake Bernstein
|
May 10, 2021 |
Breaking free from the VirusTotal silo
|
Apr 26, 2021 |
Beating security fatigue with Troy Hunt, Chloé Messdaghi, and Tanya Janca
|
Apr 12, 2021 |
Why you need to trust your VPN, with JP Taggart
|
Mar 29, 2021 |
The Malwarebytes 2021 State of Malware report
|
Mar 15, 2021 |
Defending online anonymity and speech with Eva Galperin
|
Mar 01, 2021 |
Talking Emotet's takedown with Adam Kujawa
|
Feb 15, 2021 |
Celebrating Data Privacy Day with Mozilla, DuckDuckGo, and EFF
|
Jan 28, 2021 |
Lesson planning your school's cybersecurity with Doug Levin
|
Dec 07, 2020 |
Tracking the charities that track you online with Chris Boyd
|
Nov 23, 2020 |
Forecasting IoT cybersecurity with John Donovan and Adam Kujawa
|
Nov 10, 2020 |
Finding consumer value in Cybersecurity Awareness Month with Jamie Court
|
Oct 26, 2020 |
Discussing journalism's role in cybersecurity with Seth Rosenblatt and Alfred Ng
|
Oct 12, 2020 |
Investigating digital vulnerabilities in our physical world with Samy Kamkar
|
Sep 28, 2020 |
Safely using Google Chrome Extensions with Pieter Arntz
|
Sep 14, 2020 |
Uncovering security hubris with Adam Kujawa
|
Aug 31, 2020 |
Monitoring the safety of parental monitoring apps with Emory Roane
|
Aug 17, 2020 |
Pinpointing identity and access management's future with Chuck Brooks
|
Aug 03, 2020 |
Locating concerns of Bluetooth and beacon technology with Chris Boyd
|
Jul 20, 2020 |
Pulling apart the Internet of Things with JP Taggart
|
Jul 07, 2020 |
Strengthening and forgetting passwords with Matt Davey and Kyle Swank
|
Jun 21, 2020 |
Securely working from home (WFH) with John Donovan and Adam Kujawa
|
Jun 08, 2020 |
Sounding the trumpet on web browser privacy with Pieter Arntz
|
May 26, 2020 |
Recognizing facial recognition's flaws with Chris Boyd
|
May 11, 2020 |
Mythbusting and evaluating VPNs with JP Taggart
|
Apr 27, 2020 |
Coronavirus and responding to computer viruses with Akshay Bhargava
|
Apr 13, 2020 |
Data privacy with Adam Kujawa
|
Mar 30, 2020 |
On the challenges of managed service providers
|
Mar 16, 2020 |
RSA Conference with Britta Glade
|
Mar 02, 2020 |
Introducing Lock and Code, a Malwarebytes podcast on cybersecurity
|
Feb 21, 2020 |