1. EachPod
EachPod
Lock and Code - Podcast

Lock and Code

Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.

Technology Tech News News
Update frequency
every 14 days
Average duration
41 minutes
Episodes
142
Years Active
2020 - 2025
Share to:
Lesson planning your school's cybersecurity with Doug Levin

Lesson planning your school's cybersecurity with Doug Levin

Education faced a crisis in the US this year, as the coronavirus forced schools across the country to develop new strategies for teaching. At Malwarebytes, we wanted to discover how these shifts impa…
00:40:47  |   Mon 07 Dec 2020
Tracking the charities that track you online with Chris Boyd

Tracking the charities that track you online with Chris Boyd

Today we look at two topics that, maybe surprisingly, intersect: charity organizations and online ad tracking. Ad tracking isn't new—luxury brands used to place their advertisements specifically in …
00:41:33  |   Mon 23 Nov 2020
Forecasting IoT cybersecurity with John Donovan and Adam Kujawa

Forecasting IoT cybersecurity with John Donovan and Adam Kujawa

Today, we’re offering Lock and Code listeners something different. We’re giving you a backstage pass to a training we held for employees during Cybersecurity Awareness Month. The topic? The future o…
00:41:47  |   Tue 10 Nov 2020
Finding consumer value in Cybersecurity Awareness Month with Jamie Court

Finding consumer value in Cybersecurity Awareness Month with Jamie Court

Cybersecurity Awareness Month is upon us, and while the value of the once-a-year awareness campaign may be obvious to the countless employees now enrolled in cybersecurity trainings, phishing quizzes…
00:31:15  |   Mon 26 Oct 2020
Discussing journalism's role in cybersecurity with Seth Rosenblatt and Alfred Ng

Discussing journalism's role in cybersecurity with Seth Rosenblatt and Alfred Ng

We often learn about cybersecurity issues because of reporting. And as the years have progressed, the stories have only become more intertwined into our everyday lives.

Tune in to hear about the rol…

00:37:40  |   Mon 12 Oct 2020
Investigating digital vulnerabilities in our physical world with Samy Kamkar

Investigating digital vulnerabilities in our physical world with Samy Kamkar

A recent history of hacking shows the importance of experimentation. In 2015, security researchers hacked a Jeep Cherokee and took over its steering, transmission, and brakes. In 2019, researchers ac…

00:32:24  |   Mon 28 Sep 2020
Safely using Google Chrome Extensions with Pieter Arntz

Safely using Google Chrome Extensions with Pieter Arntz

The world of Google Chrome extensions—the sometimes helpful tools that can work directly with the Google Chrome browser to provide a variety of features—is enormous. So, with a marketplace of more th…
00:29:06  |   Mon 14 Sep 2020
Uncovering security hubris with Adam Kujawa

Uncovering security hubris with Adam Kujawa

Ask yourself, right now, on a scale from one to ten, how cybersecure are you? Are you maybe inflating that answer? Our main story today concerns “security hubris,” the simple, yet difficult-to-measu…
00:34:46  |   Mon 31 Aug 2020
Monitoring the safety of parental monitoring apps with Emory Roane

Monitoring the safety of parental monitoring apps with Emory Roane

Parental monitoring apps give parents the capabilities to spot where their kids go, read what their kids read, and prevent them from, for instance, visiting websites deemed inappropriate. But where t…
00:35:52  |   Mon 17 Aug 2020
Pinpointing identity and access management's future with Chuck Brooks

Pinpointing identity and access management's future with Chuck Brooks

Identity and access management, or IAM, is the name we use for the set of technologies and policies that control who accesses what resources inside a system—from company files being locked away for o…
00:30:00  |   Mon 03 Aug 2020
Locating concerns of Bluetooth and beacon technology with Chris Boyd

Locating concerns of Bluetooth and beacon technology with Chris Boyd

Last month, cybersecurity experts warned the public about the data collection embedded in the Donald Trump 2020 re-election campaign’s mobile app. Once downloaded, the app requests broad access to us…

00:38:00  |   Mon 20 Jul 2020
Pulling apart the Internet of Things with JP Taggart

Pulling apart the Internet of Things with JP Taggart

For years, Internet capabilities have crept into modern consumer products, providing sometimes convenient, sometimes extraneous Internet connectivity. This increase in IoT devices has an obvious outc…
00:40:03  |   Tue 07 Jul 2020
Strengthening and forgetting passwords with Matt Davey and Kyle Swank

Strengthening and forgetting passwords with Matt Davey and Kyle Swank

We may know it’s important to have a strong, non-guessable, lengthy password, and yet we still probably all know someone who writes their password on a post-it, which is then affixed literally onto t…
00:34:04  |   Sun 21 Jun 2020
Securely working from home (WFH) with John Donovan and Adam Kujawa

Securely working from home (WFH) with John Donovan and Adam Kujawa

With shelter-in-place orders now in full effect to prevent the spread of coronavirus, countless businesses find themselves this year in mandatory work-from-home situations. To break down today’s ente…
00:39:50  |   Mon 08 Jun 2020
Sounding the trumpet on web browser privacy with Pieter Arntz

Sounding the trumpet on web browser privacy with Pieter Arntz

This week, we speak with Pieter Arntz, malware intelligence researcher at Malwarebytes, about web browser privacy. The often neglected subcategory of data privacy deserves a closer look. Without thep…

00:21:20  |   Tue 26 May 2020
Recognizing facial recognition's flaws with Chris Boyd

Recognizing facial recognition's flaws with Chris Boyd

Increasingly popular for both consumer products and law enforcement agencies, facial recognition technology is facing severe pushback, with at least 40 groups demanding a moratorium in the United Sta…
00:32:54  |   Mon 11 May 2020
Mythbusting and evaluating VPNs with JP Taggart

Mythbusting and evaluating VPNs with JP Taggart

VPNs surged in popularity in recent years, with at least 300 free mobile VPN apps available to the average user as of 2019. For many consumers, though, the rush of options can be confusing. To help u…
00:34:51  |   Mon 27 Apr 2020
Coronavirus and responding to computer viruses with Akshay Bhargava

Coronavirus and responding to computer viruses with Akshay Bhargava

Coronavirus has changed the face of the world. But what we've learned from how governments and medical experts respond to the spread of the virus bears similarities to how we in the cybersecurity ind…
00:21:38  |   Mon 13 Apr 2020
Data privacy with Adam Kujawa

Data privacy with Adam Kujawa

Today, our data can leave our hands and end up in the databases of countless companies, many of which we've never heard of, packaging and selling our data for reasons we could never imagine. To bette…
00:31:12  |   Mon 30 Mar 2020
On the challenges of managed service providers

On the challenges of managed service providers

We talk to two representatives from an Atlanta-based managed service provider—a manager of engineering services and a data center architect whose last names we are protecting to avoid a sudden influx…

00:32:00  |   Mon 16 Mar 2020
Disclaimer: The podcast and artwork embedded on this page are the property of Malwarebytes. This content is not affiliated with or endorsed by eachpod.com.