Lock and Code
Episodes
Securing the software supply chain, with Kim Lewandowski
20 Jun 2022
Contributed by Lukas
At the start of the global coronavirus pandemic, nearly everyone was forced to learn about the "supply chain." Immediate stockpiling by an alarmed (an...
Tor’s (security) role in the future of the Internet, with Alec Muffett
06 Jun 2022
Contributed by Lukas
Tor, which stands for "The Onion Router," has a storied reputation in the world of online privacy, but on today's episode of Lock and Code with host D...
Hunting down your data with Whitney Merrill
23 May 2022
Contributed by Lukas
Last year, Whitney Merrill wanted to know just how much information the company Clubhouse had on her, even though she wasn't a user. After many weeks ...
Recovering from romance scams with Cindy Liebes
09 May 2022
Contributed by Lukas
Earlier this year, a flashy documentary premiered on Netflix that shed light onto on often-ignored cybercrime—a romance scam. In this documentary, c...
Why software has so many vulnerabilities, with Tanya Janca
25 Apr 2022
Contributed by Lukas
Every few months, a basic but damaging flaw is revealed in a common piece of software, or a common tool used in many types of programs, and the public...
Why data protection and privacy are not the same, and why that matters
11 Apr 2022
Contributed by Lukas
Data protection, believe it or not, is not synonymous with privacy, or even data privacy. But around the world, countless members of the public often ...
Telling important stories securely, with Runa Sandvik
28 Mar 2022
Contributed by Lukas
In 2017, a former NSA contractor was arrested for allegedly leaking an internal report to the online news outlet The Intercept. To verify the report i...
De-Googling Carey Parker’s (and your) life
14 Mar 2022
Contributed by Lukas
Three years ago, a journalist for Gizmodo removed five of the biggest tech companies from her life—restricting her from using services and hardware ...
How Crisis Text Line crossed the line in the public’s mind
28 Feb 2022
Contributed by Lukas
How would you feel if the words you wrote to someone while in a crisis—maybe you were suicidal, maybe you were newly homeless, maybe you were suffe...
The world’s most coveted spyware, Pegasus
14 Feb 2022
Contributed by Lukas
Two years ago, the FBI reportedly purchased a copy of the world's most coveted spyware, a tool that can remotely and silently crack into Androids and...
How a few PhD students revealed that phishing trainings might just not work
31 Jan 2022
Contributed by Lukas
You've likely fallen for it before—a simulated test sent by your own company to determine whether its employees are vulnerable to one of the most pe...
Why we don’t patch, with Jess Dodson
18 Jan 2022
Contributed by Lukas
In 2017, the largest ransomware attack ever recorded hit the world, infecting more than 230,000 computers across more than 150 countries in just 24 h...
What angered us most about cybersecurity in 2021
03 Jan 2022
Contributed by Lukas
We are only days into 2022, which means what better time for a 2021 retrospective? But rather than looking at the biggest cyberattacks of last year—...
Everything you always wanted to know about NFTs (but were too afraid to ask)
20 Dec 2021
Contributed by Lukas
In August, the NFT for a cartoon rock sold for $1.3 million, and ever since then, much of the world has been asking: What the heck is going on? On tod...
Why Macs are the best, according to Mac expert Thomas Reed
06 Dec 2021
Contributed by Lukas
In 2021, the war for computer superiority has a clear winner, and it is the Macintosh, by Apple. The company's Pro laptops are finally, belatedly equ...
The Internet is not safe enough for women, and Sue Krautbauer has some ideas about why
22 Nov 2021
Contributed by Lukas
Cyberstalking. Harassment. Stalkerware. Nonconsensual pornography, real and digitally altered. The Internet can be a particularly ugly place for women...
Why we fail at getting the cybersecurity basics right, with Jess Dodson
08 Nov 2021
Contributed by Lukas
The cybersecurity basics should be just that—basic. Easy to do, agreed-upon, and adopted at a near 100 percent rate by companies and organizations ...
Beyond the VPN: Ultimate online privacy, with The Tor Project’s Isabela Bagueros
25 Oct 2021
Contributed by Lukas
What does online privacy mean to you? Maybe it's securing your online messages away from prying eyes. Maybe it's keeping your browsing behavior hidden...
ExpressVPN made a choice, and so have I
12 Oct 2021
Contributed by Lukas
On September 14, the US Department of Justice announced that it had resolved an earlier investigation into an international cyber hacking campaign com...
Teaching cybersecurity skills to special needs children with Alana Robinson
27 Sep 2021
Contributed by Lukas
Internet safety for kids is hard enough as it is, but what about Internet safety for children with special needs? How do you teach strong password cre...
Backups are not a simple ransomware defense, with Matt Crape
13 Sep 2021
Contributed by Lukas
A recent spate of ransomware attacks have derailed major corporations, spurring a fuel shortage on the US East Coast, shuttering grocery stores in Swe...
Hackers, tractors, and a few delayed actors. How hacker Sick Codes learned too much about John Deere
30 Aug 2021
Contributed by Lukas
No one ever wants a group of hackers to say about their company: “We had the keys to the kingdom.” But that’s exactly what the hacker Sick Codes...
Katie Moussouris hacked Clubhouse. Her emails went unanswered for weeks
16 Aug 2021
Contributed by Lukas
When Luta Security CEO and founder Katie Moussouris analyzed the popular social "listening" app Clubhouse, she found a way to eavesdrop on conversatio...
Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”
02 Aug 2021
Contributed by Lukas
The 2021 attacks on two water treatment facilities in the US—combined with ransomware attacks on an oil and gas supplier and a meat and poultry dist...
“Seven or eight” zero-days: The failed race to fix Kaseya VSA, with Victor Gevers
19 Jul 2021
Contributed by Lukas
On April 1, a volunteer researcher for the Dutch Institute for Vulnerability Disclosure (DIVD) began poking around into Kaseya VSA, a popular software...
Racing against a real-life ransomware attack, with Ski Kacoroski
06 Jul 2021
Contributed by Lukas
At 11:37 pm on the night of September 20, 2019, cybercriminals launched a ransomware attack against Northshore School District in Washington state. Ea...
Want to stop ransomware attacks? Send the cybercriminals to jail, says Brian Honan
21 Jun 2021
Contributed by Lukas
Ransomware attacks are on a different scale this year, with major attacks not just dismantling the business and management of Colonial Pipeline in the...
Can two VPN "wrongs" make a right?
07 Jun 2021
Contributed by Lukas
In 2016, a mid-20s man began an intense, prolonged harassment campaign against his new roommate. He emailed her from spoofed email accounts. He texte...
Shining a light on dark patterns with Carey Parker
24 May 2021
Contributed by Lukas
This week on Lock and Code, we speak to cybersecurity advocate and author Carey Parker about "dark patterns," which are subtle tricks online to get yo...
Alleviating ransomware's legal headaches with Jake Bernstein
10 May 2021
Contributed by Lukas
This week on Lock and Code, we speak to cybersecurity and privacy attorney Jake Bernstein about ransomware attacks that don't just derail a company's ...
Breaking free from the VirusTotal silo
26 Apr 2021
Contributed by Lukas
This week on Lock and Code, we speak to Malwarebytes Chief Information Security Officer John Donovan about the flaws in using VirusTotal as the one so...
Beating security fatigue with Troy Hunt, Chloé Messdaghi, and Tanya Janca
12 Apr 2021
Contributed by Lukas
This week on Lock and Code, we speak to Point3 Security chief strategist Chloé Messdaghi, HaveIBeenPwned founder Troy Hunt, and We Hack Purple found...
Why you need to trust your VPN, with JP Taggart
29 Mar 2021
Contributed by Lukas
This week on Lock and Code, we speak to Malwarebytes senior security researcher JP Taggart about the importance of trusting your VPN. You've likely...
The Malwarebytes 2021 State of Malware report
15 Mar 2021
Contributed by Lukas
This week on Lock and Code, we tune in to a special presentation from Adam Kujawa about the 2021 State of Malware report, which analyzed the top cybe...
Defending online anonymity and speech with Eva Galperin
01 Mar 2021
Contributed by Lukas
Every few years, after the public learns about an ugly, online harassment campaign, a familiar response shoots forth: Change the way we talk to one an...
Talking Emotet's takedown with Adam Kujawa
15 Feb 2021
Contributed by Lukas
On today's show, we discuss cybersecurity's public enemy number one: Emotet. This piece of malware started in 2014 as a simple banking Trojan, but it ...
Celebrating Data Privacy Day with Mozilla, DuckDuckGo, and EFF
28 Jan 2021
Contributed by Lukas
For Data Privacy Day this year, Lock and Code returns with a special episode featuring guests from Mozilla, DuckDuckGo, and EFF in a discussion on how...
Lesson planning your school's cybersecurity with Doug Levin
07 Dec 2020
Contributed by Lukas
Education faced a crisis in the US this year, as the coronavirus forced schools across the country to develop new strategies for teaching. At Malware...
Tracking the charities that track you online with Chris Boyd
23 Nov 2020
Contributed by Lukas
Today we look at two topics that, maybe surprisingly, intersect: charity organizations and online ad tracking. Ad tracking isn't new—luxury brands...
Forecasting IoT cybersecurity with John Donovan and Adam Kujawa
10 Nov 2020
Contributed by Lukas
Today, we’re offering Lock and Code listeners something different. We’re giving you a backstage pass to a training we held for employees during C...
Finding consumer value in Cybersecurity Awareness Month with Jamie Court
26 Oct 2020
Contributed by Lukas
Cybersecurity Awareness Month is upon us, and while the value of the once-a-year awareness campaign may be obvious to the countless employees now enr...
Discussing journalism's role in cybersecurity with Seth Rosenblatt and Alfred Ng
12 Oct 2020
Contributed by Lukas
We often learn about cybersecurity issues because of reporting. And as the years have progressed, the stories have only become more intertwined into o...
Investigating digital vulnerabilities in our physical world with Samy Kamkar
28 Sep 2020
Contributed by Lukas
A recent history of hacking shows the importance of experimentation. In 2015, security researchers hacked a Jeep Cherokee and took over its steering, ...
Safely using Google Chrome Extensions with Pieter Arntz
14 Sep 2020
Contributed by Lukas
The world of Google Chrome extensions—the sometimes helpful tools that can work directly with the Google Chrome browser to provide a variety of fea...
Uncovering security hubris with Adam Kujawa
31 Aug 2020
Contributed by Lukas
Ask yourself, right now, on a scale from one to ten, how cybersecure are you? Are you maybe inflating that answer? Our main story today concerns “...
Monitoring the safety of parental monitoring apps with Emory Roane
17 Aug 2020
Contributed by Lukas
Parental monitoring apps give parents the capabilities to spot where their kids go, read what their kids read, and prevent them from, for instance, v...
Pinpointing identity and access management's future with Chuck Brooks
03 Aug 2020
Contributed by Lukas
Identity and access management, or IAM, is the name we use for the set of technologies and policies that control who accesses what resources inside a...
Locating concerns of Bluetooth and beacon technology with Chris Boyd
20 Jul 2020
Contributed by Lukas
Last month, cybersecurity experts warned the public about the data collection embedded in the Donald Trump 2020 re-election campaign’s mobile app. O...
Pulling apart the Internet of Things with JP Taggart
07 Jul 2020
Contributed by Lukas
For years, Internet capabilities have crept into modern consumer products, providing sometimes convenient, sometimes extraneous Internet connectivity...
Strengthening and forgetting passwords with Matt Davey and Kyle Swank
21 Jun 2020
Contributed by Lukas
We may know it’s important to have a strong, non-guessable, lengthy password, and yet we still probably all know someone who writes their password ...
Securely working from home (WFH) with John Donovan and Adam Kujawa
08 Jun 2020
Contributed by Lukas
With shelter-in-place orders now in full effect to prevent the spread of coronavirus, countless businesses find themselves this year in mandatory wor...
Sounding the trumpet on web browser privacy with Pieter Arntz
26 May 2020
Contributed by Lukas
This week, we speak with Pieter Arntz, malware intelligence researcher at Malwarebytes, about web browser privacy. The often neglected subcategory of...
Recognizing facial recognition's flaws with Chris Boyd
11 May 2020
Contributed by Lukas
Increasingly popular for both consumer products and law enforcement agencies, facial recognition technology is facing severe pushback, with at least ...
Mythbusting and evaluating VPNs with JP Taggart
27 Apr 2020
Contributed by Lukas
VPNs surged in popularity in recent years, with at least 300 free mobile VPN apps available to the average user as of 2019. For many consumers, thoug...
Coronavirus and responding to computer viruses with Akshay Bhargava
13 Apr 2020
Contributed by Lukas
Coronavirus has changed the face of the world. But what we've learned from how governments and medical experts respond to the spread of the virus bea...
Data privacy with Adam Kujawa
30 Mar 2020
Contributed by Lukas
Today, our data can leave our hands and end up in the databases of countless companies, many of which we've never heard of, packaging and selling our...
On the challenges of managed service providers
16 Mar 2020
Contributed by Lukas
We talk to two representatives from an Atlanta-based managed service provider—a manager of engineering services and a data center architect whose la...
RSA Conference with Britta Glade
02 Mar 2020
Contributed by Lukas
To help us understand RSA Conference’s theme “The Human Element,” and to dive deeper into how the conference itself takes shape, we’re talking...
Introducing Lock and Code, a Malwarebytes podcast on cybersecurity
21 Feb 2020
Contributed by Lukas
Lock and Code is the flagship podcast from the cybersecurity experts at Malwarebytes. Hosted by online privacy advocate and senior threat content writ...