Lock and Code
A podcast by Malwarebytes - Sundays

Categories:
128 Episodes
-
How Apple fixed what Microsoft hasn't, with Thomas Reed
Published: 7/31/2023 -
Spy vs. spy: Exploring the LetMeSpy hack, with maia arson crimew
Published: 7/17/2023 -
Of sharks, surveillance, and spied-on emails: This is Section 702, with Matthew Guariglia
Published: 7/3/2023 -
Why businesses need a disinformation defense plan, with Lisa Kaplan: Lock and Code S04E13
Published: 6/19/2023 -
Trusting AI not to lie: The cost of truth
Published: 6/5/2023 -
Identity crisis: How an anti-porn crusade could jam the Internet, featuring Alec Muffett
Published: 5/22/2023 -
The rise of "Franken-ransomware," with Allan Liska
Published: 5/8/2023 -
Removing the human: When should AI be used in emotional crisis?
Published: 4/24/2023 -
How the cops buy a "God view" of your location data, with Bennett Cyphers
Published: 4/10/2023 -
Solving the password’s hardest problem with passkeys, featuring Anna Pobletts
Published: 3/27/2023 -
"Brad Pitt," a still body, ketchup, and a knife, or the best trick ever played on a romance scammer, with Becky Holmes
Published: 3/13/2023 -
Fighting censorship online, or, encryption’s latest surprise use-case, with Mallory Knodel
Published: 2/27/2023 -
What is AI ”good” at (and what the heck is it, actually), with Josh Saxe
Published: 2/13/2023 -
A private moment, caught by a Roomba, ended up on Facebook. Eileen Guo explains how
Published: 1/30/2023 -
Fighting tech’s gender gap with TracketPacer
Published: 1/16/2023 -
Why does technology no longer excite?
Published: 1/1/2023 -
Chasing cryptocurrency through cyberspace, with Brian Carter
Published: 12/19/2022 -
Security advisories are falling short. Here’s why, with Dustin Childs
Published: 12/5/2022 -
Threat hunting: How MDR secures your business
Published: 11/21/2022 -
How student surveillance fails everyone
Published: 11/7/2022
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.