Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Lock and Code

Technology News

Activity Overview

Episode publication activity over the past year

Episodes

Showing 101-159 of 159
«« ← Prev Page 2 of 2

Securing the software supply chain, with Kim Lewandowski

20 Jun 2022

Contributed by Lukas

At the start of the global coronavirus pandemic, nearly everyone was forced to learn about the "supply chain." Immediate stockpiling by an alarmed (an...

Tor’s (security) role in the future of the Internet, with Alec Muffett

06 Jun 2022

Contributed by Lukas

Tor, which stands for "The Onion Router," has a storied reputation in the world of online privacy, but on today's episode of Lock and Code with host D...

Hunting down your data with Whitney Merrill

23 May 2022

Contributed by Lukas

Last year, Whitney Merrill wanted to know just how much information the company Clubhouse had on her, even though she wasn't a user. After many weeks ...

Recovering from romance scams with Cindy Liebes

09 May 2022

Contributed by Lukas

Earlier this year, a flashy documentary premiered on Netflix that shed light onto on often-ignored cybercrime—a romance scam. In this documentary, c...

Why software has so many vulnerabilities, with Tanya Janca

25 Apr 2022

Contributed by Lukas

Every few months, a basic but damaging flaw is revealed in a common piece of software, or a common tool used in many types of programs, and the public...

Why data protection and privacy are not the same, and why that matters

11 Apr 2022

Contributed by Lukas

Data protection, believe it or not, is not synonymous with privacy, or even data privacy. But around the world, countless members of the public often ...

Telling important stories securely, with Runa Sandvik

28 Mar 2022

Contributed by Lukas

In 2017, a former NSA contractor was arrested for allegedly leaking an internal report to the online news outlet The Intercept. To verify the report i...

De-Googling Carey Parker’s (and your) life

14 Mar 2022

Contributed by Lukas

Three years ago, a journalist for Gizmodo removed five of the biggest tech companies from her life—restricting her from using services and hardware ...

How Crisis Text Line crossed the line in the public’s mind

28 Feb 2022

Contributed by Lukas

How would you feel if the words you wrote to someone while in a crisis—maybe you were suicidal, maybe you were newly homeless, maybe you were suffe...

The world’s most coveted spyware, Pegasus

14 Feb 2022

Contributed by Lukas

Two years ago, the FBI reportedly purchased a copy of the world's most coveted spyware, a tool that can remotely and silently crack into Androids and...

How a few PhD students revealed that phishing trainings might just not work

31 Jan 2022

Contributed by Lukas

You've likely fallen for it before—a simulated test sent by your own company to determine whether its employees are vulnerable to one of the most pe...

Why we don’t patch, with Jess Dodson

18 Jan 2022

Contributed by Lukas

In 2017, the largest ransomware attack ever recorded hit the world, infecting more than 230,000 computers across more than 150 countries in just 24 h...

What angered us most about cybersecurity in 2021

03 Jan 2022

Contributed by Lukas

We are only days into 2022, which means what better time for a 2021 retrospective? But rather than looking at the biggest cyberattacks of last year—...

Everything you always wanted to know about NFTs (but were too afraid to ask)

20 Dec 2021

Contributed by Lukas

In August, the NFT for a cartoon rock sold for $1.3 million, and ever since then, much of the world has been asking: What the heck is going on? On tod...

Why Macs are the best, according to Mac expert Thomas Reed

06 Dec 2021

Contributed by Lukas

In 2021, the war for computer superiority has a clear winner, and it is the Macintosh, by Apple. The company's Pro laptops are finally, belatedly equ...

The Internet is not safe enough for women, and Sue Krautbauer has some ideas about why

22 Nov 2021

Contributed by Lukas

Cyberstalking. Harassment. Stalkerware. Nonconsensual pornography, real and digitally altered. The Internet can be a particularly ugly place for women...

Why we fail at getting the cybersecurity basics right, with Jess Dodson

08 Nov 2021

Contributed by Lukas

The cybersecurity basics should be just that—basic. Easy to do, agreed-upon, and adopted at a near 100 percent rate by companies and organizations ...

Beyond the VPN: Ultimate online privacy, with The Tor Project’s Isabela Bagueros

25 Oct 2021

Contributed by Lukas

What does online privacy mean to you? Maybe it's securing your online messages away from prying eyes. Maybe it's keeping your browsing behavior hidden...

ExpressVPN made a choice, and so have I

12 Oct 2021

Contributed by Lukas

On September 14, the US Department of Justice announced that it had resolved an earlier investigation into an international cyber hacking campaign com...

Teaching cybersecurity skills to special needs children with Alana Robinson

27 Sep 2021

Contributed by Lukas

Internet safety for kids is hard enough as it is, but what about Internet safety for children with special needs? How do you teach strong password cre...

Backups are not a simple ransomware defense, with Matt Crape

13 Sep 2021

Contributed by Lukas

A recent spate of ransomware attacks have derailed major corporations, spurring a fuel shortage on the US East Coast, shuttering grocery stores in Swe...

Hackers, tractors, and a few delayed actors. How hacker Sick Codes learned too much about John Deere

30 Aug 2021

Contributed by Lukas

No one ever wants a group of hackers to say about their company: “We had the keys to the kingdom.” But that’s exactly what the hacker Sick Codes...

Katie Moussouris hacked Clubhouse. Her emails went unanswered for weeks

16 Aug 2021

Contributed by Lukas

When Luta Security CEO and founder Katie Moussouris analyzed the popular social "listening" app Clubhouse, she found a way to eavesdrop on conversatio...

Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”

02 Aug 2021

Contributed by Lukas

The 2021 attacks on two water treatment facilities in the US—combined with ransomware attacks on an oil and gas supplier and a meat and poultry dist...

“Seven or eight” zero-days: The failed race to fix Kaseya VSA, with Victor Gevers

19 Jul 2021

Contributed by Lukas

On April 1, a volunteer researcher for the Dutch Institute for Vulnerability Disclosure (DIVD) began poking around into Kaseya VSA, a popular software...

Racing against a real-life ransomware attack, with Ski Kacoroski

06 Jul 2021

Contributed by Lukas

At 11:37 pm on the night of September 20, 2019, cybercriminals launched a ransomware attack against Northshore School District in Washington state. Ea...

Want to stop ransomware attacks? Send the cybercriminals to jail, says Brian Honan

21 Jun 2021

Contributed by Lukas

Ransomware attacks are on a different scale this year, with major attacks not just dismantling the business and management of Colonial Pipeline in the...

Can two VPN "wrongs" make a right?

07 Jun 2021

Contributed by Lukas

In 2016, a mid-20s man began an intense, prolonged harassment campaign against his new roommate. He emailed her from spoofed email accounts. He texte...

Shining a light on dark patterns with Carey Parker

24 May 2021

Contributed by Lukas

This week on Lock and Code, we speak to cybersecurity advocate and author Carey Parker about "dark patterns," which are subtle tricks online to get yo...

Alleviating ransomware's legal headaches with Jake Bernstein

10 May 2021

Contributed by Lukas

This week on Lock and Code, we speak to cybersecurity and privacy attorney Jake Bernstein about ransomware attacks that don't just derail a company's ...

Breaking free from the VirusTotal silo

26 Apr 2021

Contributed by Lukas

This week on Lock and Code, we speak to Malwarebytes Chief Information Security Officer John Donovan about the flaws in using VirusTotal as the one so...

Beating security fatigue with Troy Hunt, Chloé Messdaghi, and Tanya Janca

12 Apr 2021

Contributed by Lukas

This week on Lock and Code, we speak to Point3 Security chief strategist Chloé Messdaghi, HaveIBeenPwned founder Troy Hunt, and We Hack Purple found...

Why you need to trust your VPN, with JP Taggart

29 Mar 2021

Contributed by Lukas

This week on Lock and Code, we speak to Malwarebytes senior security researcher JP Taggart about the importance of trusting your VPN.   You've likely...

The Malwarebytes 2021 State of Malware report

15 Mar 2021

Contributed by Lukas

This week on Lock and Code, we tune in to a special presentation from Adam Kujawa about the 2021 State of Malware report, which analyzed the top cybe...

Defending online anonymity and speech with Eva Galperin

01 Mar 2021

Contributed by Lukas

Every few years, after the public learns about an ugly, online harassment campaign, a familiar response shoots forth: Change the way we talk to one an...

Talking Emotet's takedown with Adam Kujawa

15 Feb 2021

Contributed by Lukas

On today's show, we discuss cybersecurity's public enemy number one: Emotet. This piece of malware started in 2014 as a simple banking Trojan, but it ...

Celebrating Data Privacy Day with Mozilla, DuckDuckGo, and EFF

28 Jan 2021

Contributed by Lukas

For Data Privacy Day this year, Lock and Code returns with a special episode featuring guests from Mozilla, DuckDuckGo, and EFF in a discussion on how...

Lesson planning your school's cybersecurity with Doug Levin

07 Dec 2020

Contributed by Lukas

Education faced a crisis in the US this year, as the coronavirus forced schools across the country to develop new strategies for teaching. At Malware...

Tracking the charities that track you online with Chris Boyd

23 Nov 2020

Contributed by Lukas

Today we look at two topics that, maybe surprisingly, intersect: charity organizations and online ad tracking. Ad tracking isn't new—luxury brands...

Forecasting IoT cybersecurity with John Donovan and Adam Kujawa

10 Nov 2020

Contributed by Lukas

Today, we’re offering Lock and Code listeners something different. We’re giving you a backstage pass to a training we held for employees during C...

Finding consumer value in Cybersecurity Awareness Month with Jamie Court

26 Oct 2020

Contributed by Lukas

Cybersecurity Awareness Month is upon us, and while the value of the once-a-year awareness campaign may be obvious to the countless employees now enr...

Discussing journalism's role in cybersecurity with Seth Rosenblatt and Alfred Ng

12 Oct 2020

Contributed by Lukas

We often learn about cybersecurity issues because of reporting. And as the years have progressed, the stories have only become more intertwined into o...

Investigating digital vulnerabilities in our physical world with Samy Kamkar

28 Sep 2020

Contributed by Lukas

A recent history of hacking shows the importance of experimentation. In 2015, security researchers hacked a Jeep Cherokee and took over its steering, ...

Safely using Google Chrome Extensions with Pieter Arntz

14 Sep 2020

Contributed by Lukas

The world of Google Chrome extensions—the sometimes helpful tools that can work directly with the Google Chrome browser to provide a variety of fea...

Uncovering security hubris with Adam Kujawa

31 Aug 2020

Contributed by Lukas

Ask yourself, right now, on a scale from one to ten, how cybersecure are you? Are you maybe inflating that answer? Our main story today concerns “...

Monitoring the safety of parental monitoring apps with Emory Roane

17 Aug 2020

Contributed by Lukas

Parental monitoring apps give parents the capabilities to spot where their kids go, read what their kids read, and prevent them from, for instance, v...

Pinpointing identity and access management's future with Chuck Brooks

03 Aug 2020

Contributed by Lukas

Identity and access management, or IAM, is the name we use for the set of technologies and policies that control who accesses what resources inside a...

Locating concerns of Bluetooth and beacon technology with Chris Boyd

20 Jul 2020

Contributed by Lukas

Last month, cybersecurity experts warned the public about the data collection embedded in the Donald Trump 2020 re-election campaign’s mobile app. O...

Pulling apart the Internet of Things with JP Taggart

07 Jul 2020

Contributed by Lukas

For years, Internet capabilities have crept into modern consumer products, providing sometimes convenient, sometimes extraneous Internet connectivity...

Strengthening and forgetting passwords with Matt Davey and Kyle Swank

21 Jun 2020

Contributed by Lukas

We may know it’s important to have a strong, non-guessable, lengthy password, and yet we still probably all know someone who writes their password ...

Securely working from home (WFH) with John Donovan and Adam Kujawa

08 Jun 2020

Contributed by Lukas

With shelter-in-place orders now in full effect to prevent the spread of coronavirus, countless businesses find themselves this year in mandatory wor...

Sounding the trumpet on web browser privacy with Pieter Arntz

26 May 2020

Contributed by Lukas

This week, we speak with Pieter Arntz, malware intelligence researcher at Malwarebytes, about web browser privacy. The often neglected subcategory of...

Recognizing facial recognition's flaws with Chris Boyd

11 May 2020

Contributed by Lukas

Increasingly popular for both consumer products and law enforcement agencies, facial recognition technology is facing severe pushback, with at least ...

Mythbusting and evaluating VPNs with JP Taggart

27 Apr 2020

Contributed by Lukas

VPNs surged in popularity in recent years, with at least 300 free mobile VPN apps available to the average user as of 2019. For many consumers, thoug...

Coronavirus and responding to computer viruses with Akshay Bhargava

13 Apr 2020

Contributed by Lukas

Coronavirus has changed the face of the world. But what we've learned from how governments and medical experts respond to the spread of the virus bea...

Data privacy with Adam Kujawa

30 Mar 2020

Contributed by Lukas

Today, our data can leave our hands and end up in the databases of countless companies, many of which we've never heard of, packaging and selling our...

On the challenges of managed service providers

16 Mar 2020

Contributed by Lukas

We talk to two representatives from an Atlanta-based managed service provider—a manager of engineering services and a data center architect whose la...

RSA Conference with Britta Glade

02 Mar 2020

Contributed by Lukas

To help us understand RSA Conference’s theme “The Human Element,” and to dive deeper into how the conference itself takes shape, we’re talking...

Introducing Lock and Code, a Malwarebytes podcast on cybersecurity

21 Feb 2020

Contributed by Lukas

Lock and Code is the flagship podcast from the cybersecurity experts at Malwarebytes. Hosted by online privacy advocate and senior threat content writ...

«« ← Prev Page 2 of 2