Lock and Code
A podcast by Malwarebytes - Domenica
137 Episodio
-
San Francisco’s fight against deepfake porn, with City Attorney David Chiu
Pubblicato: 23/09/2024 -
What the arrest of Telegram's CEO means, with Eva Galperin
Pubblicato: 09/09/2024 -
Move over malware: Why one teen is more worried about AI (re-air)
Pubblicato: 26/08/2024 -
AI girlfriends want to know all about you. So might ChatGPT
Pubblicato: 12/08/2024 -
SIEM is not storage, with Jess Dodson
Pubblicato: 29/07/2024 -
How an AI “artist” stole a woman’s face, with Ali Diamond
Pubblicato: 15/07/2024 -
Busted for book club? Why cops want to see what you’re reading, with Sarah Lamdan
Pubblicato: 01/07/2024 -
(Almost) everything you always wanted to know about cybersecurity, but were too afraid to ask, with Tjitske de Vries
Pubblicato: 17/06/2024 -
800 arrests, 40 tons of drugs, and one backdoor, or what a phone startup gave the FBI, with Joseph Cox
Pubblicato: 03/06/2024 -
Your vacation, reservations, and online dates, now chosen by AI
Pubblicato: 20/05/2024 -
"No social media 'til 16," and other fixes for a teen mental health crisis, with Dr. Jean Twenge
Pubblicato: 06/05/2024 -
Picking fights and gaining rights, with Justin Brookman
Pubblicato: 22/04/2024 -
Porn panic imperils privacy online, with Alec Muffett (re-air)
Pubblicato: 08/04/2024 -
Securing your home network is long, tiresome, and entirely worth it, with Carey Parker
Pubblicato: 25/03/2024 -
Going viral shouldn't lead to bomb threats, with Leigh Honeywell
Pubblicato: 11/03/2024 -
How to make a fake ID online, with Joseph Cox
Pubblicato: 26/02/2024 -
If only you had to worry about malware, with Jason Haddix
Pubblicato: 12/02/2024 -
Bruce Schneier predicts a future of AI-powered mass spying
Pubblicato: 29/01/2024 -
A true tale of virtual kidnapping
Pubblicato: 15/01/2024 -
DNA data deserves better, with Suzanne Bernstein
Pubblicato: 01/01/2024
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
