1. EachPod
EachPod
Lock and Code - Podcast

Lock and Code

Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.

Technology Tech News News
Update frequency
every 14 days
Average duration
41 minutes
Episodes
142
Years Active
2020 - 2025
Share to:
The rise of

The rise of "Franken-ransomware," with Allan Liska

Ransomware is becoming bespoke, and that could mean trouble for businesses and law enforcement investigators. 

It wasn't always like this. 

For a few years now, ransomware operators have congregated ar…

00:51:19  |   Mon 08 May 2023
Removing the human: When should AI be used in emotional crisis?

Removing the human: When should AI be used in emotional crisis?

In January, a mental health nonprofit admitted that it had used Artificial Intelligence to help talk to people in distress. 

Prompted first by a user's longing for personal improvement—and the difficu…

00:41:19  |   Mon 24 Apr 2023
How the cops buy a

How the cops buy a "God view" of your location data, with Bennett Cyphers

The list of people and organizations that are hungry for your location data—collected so routinely and packaged so conveniently that it can easily reveal where you live, where you work, where you sho…

00:46:31  |   Mon 10 Apr 2023
Solving the password’s hardest problem with passkeys, featuring Anna Pobletts

Solving the password’s hardest problem with passkeys, featuring Anna Pobletts

How many passwords do you have? If you're at all like our Lock and Code host David Ruiz, that number hovers around 200. But the important follow up question is: How many of those passwords can you ac…

00:38:28  |   Mon 27 Mar 2023

"Brad Pitt," a still body, ketchup, and a knife, or the best trick ever played on a romance scammer, with Becky Holmes

Becky Holmes knows how to throw a romance scammer off script—simply bring up cannibalism. 

In January, Holmes shared on Twitter that an account with the name "Thomas Smith" had started up a random cha…

00:48:23  |   Mon 13 Mar 2023
Fighting censorship online, or, encryption’s latest surprise use-case, with Mallory Knodel

Fighting censorship online, or, encryption’s latest surprise use-case, with Mallory Knodel

Government threats to end-to-end encryption—the technology that secures your messages and shared photos and videos—have been around for decades, but the most recent threats to this technology are uni…

00:59:35  |   Mon 27 Feb 2023
What is AI ”good” at (and what the heck is it, actually), with Josh Saxe

What is AI ”good” at (and what the heck is it, actually), with Josh Saxe

In November of last year, the AI research and development lab OpenAI revealed its latest, most advanced language project: A tool called ChatGPT.

ChatGPT is so much more than "just" a chatbot. As users…

00:45:05  |   Mon 13 Feb 2023
A private moment, caught by a Roomba, ended up on Facebook. Eileen Guo explains how

A private moment, caught by a Roomba, ended up on Facebook. Eileen Guo explains how

In 2020, a photo of a woman sitting on a toilet—her shorts pulled half-way down her thighs—was shared on Facebook, and it was shared by someone whose job it was to look at that photo and, by labeling…

00:46:21  |   Mon 30 Jan 2023
Fighting tech’s gender gap with TracketPacer

Fighting tech’s gender gap with TracketPacer

Last month, the TikTok user TracketPacer posted a video online called “Network Engineering Facts to Impress No One at Zero Parties.”  TracketPacer regularly posts fun, educational content about how t…

00:53:57  |   Mon 16 Jan 2023
Why does technology no longer excite?

Why does technology no longer excite?

When did technology last excite you? 

If Douglas Adams, author of The Hitchhiker's Guide to the Galaxy, is to be believed, your own excitement ended, simply had to end, after turning 35 years old. De…

00:43:19  |   Sun 01 Jan 2023
Chasing cryptocurrency through cyberspace, with Brian Carter

Chasing cryptocurrency through cyberspace, with Brian Carter

On June 7, 2021, the US Department of Justice announced a breakthrough: Less than one month after the oil and gas pipeline company Colonial Pipeline had paid its ransomware attackers roughly $4.4 mil…

00:47:36  |   Mon 19 Dec 2022
Security advisories are falling short. Here’s why, with Dustin Childs

Security advisories are falling short. Here’s why, with Dustin Childs

Decades ago, patching was, to lean into a corny joke, a bit patchy. 

In the late 90s, the Microsoft operating system (OS) Windows 98 had a supportive piece of software that would find security patche…

00:42:00  |   Mon 05 Dec 2022
Threat hunting: How MDR secures your business

Threat hunting: How MDR secures your business

A cyberattack is not the same thing as malware—in fact, malware itself is typically the last stage of an attack, the punctuation mark that closes out months of work from cybercriminals who have infil…

00:59:48  |   Mon 21 Nov 2022
How student surveillance fails everyone

How student surveillance fails everyone

Last month, when Malwarebytes published joint research with 1Password about the online habits of parents and teenagers today, we spoke with a Bay Area high school graduate on the Lock and Code podcas…

00:44:44  |   Mon 07 Nov 2022
A gym heist in London goes cyber

A gym heist in London goes cyber

A thief has been stalking London. 

This past summer, multiple women reported similar crimes to the police: While working out at their local gyms, someone snuck into the locker rooms, busted open thei…

00:25:24  |   Mon 24 Oct 2022
Teen talk: What it’s like to grow up online, and the role of parents

Teen talk: What it’s like to grow up online, and the role of parents

Growing up is different for teens today. 

Issues with identity, self-expression, bullying, fitting in, and trusting your friends and family—while all those certainly existed decades ago, they were ne…

00:58:20  |   Mon 10 Oct 2022
Calling in the ransomware negotiator, with Kurtis Minder

Calling in the ransomware negotiator, with Kurtis Minder

Ransomware can send any company into crisis. 

Immediately following an attack, the notoriously disruptive malware can spread across networks and machines, locking up important files and rendering vita…

00:43:20  |   Mon 26 Sep 2022
The MSP playbook on deciphering tech promises and shaping security culture

The MSP playbook on deciphering tech promises and shaping security culture

The in-person cybersecurity conference has returned.

More than two years after Covid-19 pushed nearly every in-person event online, cybersecurity has returned to the exhibition hall. In San Francisco…

00:44:40  |   Mon 12 Sep 2022
Playing Doom on a John Deere tractor with Sick Codes

Playing Doom on a John Deere tractor with Sick Codes

In 1993, the video game developers at id Software released Doom, a first-person shooter that placed a nameless protagonist into the fiery depths of hell, equipped with an arsenal of weapons to mow do…

00:41:39  |   Mon 29 Aug 2022
Donut breach: Lessons from pen-tester Mike Miller

Donut breach: Lessons from pen-tester Mike Miller

When Mike Miller was hired by a client to run a penetration test on one of their offices, he knew exactly where to start: Krispy Kreme. Equipped with five dozen donuts (the boxes stacked just high en…

00:37:12  |   Mon 15 Aug 2022
Disclaimer: The podcast and artwork embedded on this page are the property of Malwarebytes. This content is not affiliated with or endorsed by eachpod.com.