1. EachPod
EachPod
Lock and Code - Podcast

Lock and Code

Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.

Technology Tech News News
Update frequency
every 14 days
Average duration
41 minutes
Episodes
142
Years Active
2020 - 2025
Share to:
How to make a fake ID online, with Joseph Cox

How to make a fake ID online, with Joseph Cox

For decades, fake IDs had roughly three purposes: Buying booze before legally allowed, getting into age-restricted clubs, and, we can only assume, completing nation-state spycraft for embedded inform…

00:36:49  |   Mon 26 Feb 2024
If only you had to worry about malware, with Jason Haddix

If only you had to worry about malware, with Jason Haddix

If your IT and security teams think malware is bad, wait until they learn about everything else.

In 2024, the modern cyberattack is a segmented, prolonged, and professional effort, in which specialist…

00:40:41  |   Mon 12 Feb 2024
Bruce Schneier predicts a future of AI-powered mass spying

Bruce Schneier predicts a future of AI-powered mass spying

If the internet helped create the era of mass surveillance, then artificial intelligence will bring about an era of mass spying.

That’s the latest prediction from noted cryptographer and computer secu…

00:26:27  |   Mon 29 Jan 2024
A true tale of virtual kidnapping

A true tale of virtual kidnapping

On Thursday, December 28, at 8:30 pm in the Utah town of Riverdale, the city police began investigating what they believed was a kidnapping.

17-year-old foreign exchange student Kai Zhuang was missing…

00:18:51  |   Mon 15 Jan 2024
DNA data deserves better, with Suzanne Bernstein

DNA data deserves better, with Suzanne Bernstein

Hackers want to know everything about you: Your credit card number, your ID and passport info, and now, your DNA.

On October 1 2023, on a hacking website called BreachForums, a group of cybercriminals…

00:37:47  |   Mon 01 Jan 2024
Meet the entirely legal, iPhone-crashing device: the Flipper Zero

Meet the entirely legal, iPhone-crashing device: the Flipper Zero

It talks, it squawks, it even blocks! The stocking-stuffer on every hobby hacker’s wish list this year is the Flipper Zero.

“Talk” across low-frequency radio to surreptitiously change TV channels, emu…

00:36:26  |   Mon 18 Dec 2023
Why a ransomware gang tattled on its victim, with Allan Liska

Why a ransomware gang tattled on its victim, with Allan Liska

Like the grade-school dweeb who reminds their teacher to assign tonight’s homework, or the power-tripping homeowner who threatens every neighbor with an HOA citation, the ransomware group ALPHV can n…

00:35:34  |   Mon 04 Dec 2023
Defeating Little Brother requires a new outlook on privacy

Defeating Little Brother requires a new outlook on privacy

A worrying trend is cropping up amongst Americans, particularly within Generation Z—they're spying on each other more.

Whether reading someone's DMs, rifling through a partner's text messages, or even…

00:45:37  |   Mon 06 Nov 2023
MGM attack is too late a wake-up call for businesses, says James Fair

MGM attack is too late a wake-up call for businesses, says James Fair

In September, the Las Vegas casino and hotel operator MGM Resorts became a trending topic on social media... but for all the wrong reasons. A TikTok user posted a video taken from inside the casino f…

00:40:26  |   Mon 23 Oct 2023
AI sneak attacks, location spying, and definitely not malware, or, what one teenager fears online

AI sneak attacks, location spying, and definitely not malware, or, what one teenager fears online

What are you most worried about online? And what are you doing to stay safe? 

Depending on who you are, those could be very different answers, but for teenagers and members of Generation Z, the intern…

00:47:38  |   Mon 09 Oct 2023
What does a car need to know about your sex life?

What does a car need to know about your sex life?

When you think of the modern tools that most invade your privacy, what do you picture?

There's the obvious answers, like social media platforms including Facebook and Instagram. There's email and "eve…

00:44:04  |   Mon 25 Sep 2023
Re-air: What teenagers face growing up online

Re-air: What teenagers face growing up online

In 2022, Malwarebytes investigated the blurry, shifting idea of “identity” on the internet, and how online identities are not only shaped by the people behind them, but also inherited by the internet…

00:36:50  |   Mon 11 Sep 2023

"An influx of Elons," a hospital visit, and magic men: Becky Holmes shares more romance scams

Becky Holmes is a big deal online. 

Hugh Jackman has invited her to dinner. Prince William has told her she has "such a beautiful name." Once, Ricky Gervais simply needed her photos ("I want you to ta…

00:51:46  |   Mon 28 Aug 2023
A new type of

A new type of "freedom," or, tracking children with AirTags, with Heather Kelly

"Freedom" is a big word, and for many parents today, it's a word that includes location tracking. 

Across America, parents are snapping up Apple AirTags, the inexpensive location tracking devices that…

00:37:52  |   Sun 13 Aug 2023
How Apple fixed what Microsoft hasn't, with Thomas Reed

How Apple fixed what Microsoft hasn't, with Thomas Reed

Earlier this month, a group of hackers was spotted using a set of malicious tools—that originally gained popularity with online video game cheaters—to hide their Windows-based malware from being dete…

00:40:29  |   Mon 31 Jul 2023
Spy vs. spy: Exploring the LetMeSpy hack, with maia arson crimew

Spy vs. spy: Exploring the LetMeSpy hack, with maia arson crimew

The language of a data breach, no matter what company gets hit, is largely the same. There's the stolen data—be it email addresses, credit card numbers, or even medical records. There are the users—u…

00:39:03  |   Mon 17 Jul 2023
Of sharks, surveillance, and spied-on emails: This is Section 702, with Matthew Guariglia

Of sharks, surveillance, and spied-on emails: This is Section 702, with Matthew Guariglia

In the United States, when the police want to conduct a search on a suspected criminal, they must first obtain a search warrant. It is one of the foundational rights given to US persons under the Con…

00:43:26  |   Mon 03 Jul 2023
Why businesses need a disinformation defense plan, with Lisa Kaplan: Lock and Code S04E13

Why businesses need a disinformation defense plan, with Lisa Kaplan: Lock and Code S04E13

When you think about the word "cyberthreat," what first comes to mind? Is it ransomware? Is it spyware? Maybe it's any collection of the infamous viruses, worms, Trojans, and botnets that have crippl…

00:42:26  |   Mon 19 Jun 2023
Trusting AI not to lie: The cost of truth

Trusting AI not to lie: The cost of truth

In May, a lawyer who was defending their client in a lawsuit against Columbia's biggest airline, Avianca, submitted a legal filing before a court in Manhattan, New York, that listed several previous …

00:44:05  |   Mon 05 Jun 2023
Identity crisis: How an anti-porn crusade could jam the Internet, featuring Alec Muffett

Identity crisis: How an anti-porn crusade could jam the Internet, featuring Alec Muffett

On January 1, 2023, the Internet in Louisiana looked a little different than the Internet in Texas, Mississippi, and Arkansas—its next-door state neighbors. And on May 1, the Internet in Utah looked …

00:47:42  |   Mon 22 May 2023
Disclaimer: The podcast and artwork embedded on this page are the property of Malwarebytes. This content is not affiliated with or endorsed by eachpod.com.