Lock and Code
Een podcast door Malwarebytes - Zondagen
137 Afleveringen
-
Meet the entirely legal, iPhone-crashing device: the Flipper Zero
Gepubliceerd: 18-12-2023 -
Why a ransomware gang tattled on its victim, with Allan Liska
Gepubliceerd: 4-12-2023 -
Defeating Little Brother requires a new outlook on privacy
Gepubliceerd: 6-11-2023 -
MGM attack is too late a wake-up call for businesses, says James Fair
Gepubliceerd: 23-10-2023 -
AI sneak attacks, location spying, and definitely not malware, or, what one teenager fears online
Gepubliceerd: 9-10-2023 -
What does a car need to know about your sex life?
Gepubliceerd: 25-9-2023 -
Re-air: What teenagers face growing up online
Gepubliceerd: 11-9-2023 -
"An influx of Elons," a hospital visit, and magic men: Becky Holmes shares more romance scams
Gepubliceerd: 28-8-2023 -
A new type of "freedom," or, tracking children with AirTags, with Heather Kelly
Gepubliceerd: 13-8-2023 -
How Apple fixed what Microsoft hasn't, with Thomas Reed
Gepubliceerd: 31-7-2023 -
Spy vs. spy: Exploring the LetMeSpy hack, with maia arson crimew
Gepubliceerd: 17-7-2023 -
Of sharks, surveillance, and spied-on emails: This is Section 702, with Matthew Guariglia
Gepubliceerd: 3-7-2023 -
Why businesses need a disinformation defense plan, with Lisa Kaplan: Lock and Code S04E13
Gepubliceerd: 19-6-2023 -
Trusting AI not to lie: The cost of truth
Gepubliceerd: 5-6-2023 -
Identity crisis: How an anti-porn crusade could jam the Internet, featuring Alec Muffett
Gepubliceerd: 22-5-2023 -
The rise of "Franken-ransomware," with Allan Liska
Gepubliceerd: 8-5-2023 -
Removing the human: When should AI be used in emotional crisis?
Gepubliceerd: 24-4-2023 -
How the cops buy a "God view" of your location data, with Bennett Cyphers
Gepubliceerd: 10-4-2023 -
Solving the password’s hardest problem with passkeys, featuring Anna Pobletts
Gepubliceerd: 27-3-2023 -
"Brad Pitt," a still body, ketchup, and a knife, or the best trick ever played on a romance scammer, with Becky Holmes
Gepubliceerd: 13-3-2023
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
