Lock and Code
Een podcast door Malwarebytes - Zondagen
137 Afleveringen
-
San Francisco’s fight against deepfake porn, with City Attorney David Chiu
Gepubliceerd: 23-9-2024 -
What the arrest of Telegram's CEO means, with Eva Galperin
Gepubliceerd: 9-9-2024 -
Move over malware: Why one teen is more worried about AI (re-air)
Gepubliceerd: 26-8-2024 -
AI girlfriends want to know all about you. So might ChatGPT
Gepubliceerd: 12-8-2024 -
SIEM is not storage, with Jess Dodson
Gepubliceerd: 29-7-2024 -
How an AI “artist” stole a woman’s face, with Ali Diamond
Gepubliceerd: 15-7-2024 -
Busted for book club? Why cops want to see what you’re reading, with Sarah Lamdan
Gepubliceerd: 1-7-2024 -
(Almost) everything you always wanted to know about cybersecurity, but were too afraid to ask, with Tjitske de Vries
Gepubliceerd: 17-6-2024 -
800 arrests, 40 tons of drugs, and one backdoor, or what a phone startup gave the FBI, with Joseph Cox
Gepubliceerd: 3-6-2024 -
Your vacation, reservations, and online dates, now chosen by AI
Gepubliceerd: 20-5-2024 -
"No social media 'til 16," and other fixes for a teen mental health crisis, with Dr. Jean Twenge
Gepubliceerd: 6-5-2024 -
Picking fights and gaining rights, with Justin Brookman
Gepubliceerd: 22-4-2024 -
Porn panic imperils privacy online, with Alec Muffett (re-air)
Gepubliceerd: 8-4-2024 -
Securing your home network is long, tiresome, and entirely worth it, with Carey Parker
Gepubliceerd: 25-3-2024 -
Going viral shouldn't lead to bomb threats, with Leigh Honeywell
Gepubliceerd: 11-3-2024 -
How to make a fake ID online, with Joseph Cox
Gepubliceerd: 26-2-2024 -
If only you had to worry about malware, with Jason Haddix
Gepubliceerd: 12-2-2024 -
Bruce Schneier predicts a future of AI-powered mass spying
Gepubliceerd: 29-1-2024 -
A true tale of virtual kidnapping
Gepubliceerd: 15-1-2024 -
DNA data deserves better, with Suzanne Bernstein
Gepubliceerd: 1-1-2024
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
