Lock and Code
Podcast készítő Malwarebytes - Vasárnapok

Kategóriák:
128 Epizód
-
Surveillance pricing is "evil and sinister," explains Justin Kloczko
Közzétéve: 2025. 02. 23. -
A suicide reveals the lonely side of AI chatbots, with Courtney Brown
Közzétéve: 2025. 02. 09. -
Three privacy rules for 2025
Közzétéve: 2025. 01. 26. -
The new rules for AI and encrypted messaging, with Mallory Knodel
Közzétéve: 2025. 01. 12. -
Is nowhere safe from AI slop?
Közzétéve: 2024. 12. 29. -
A day in the life of a privacy pro, with Ron de Jesus
Közzétéve: 2024. 12. 16. -
These cars want to know about your sex life (re-air)
Közzétéve: 2024. 12. 01. -
An air fryer, a ring, and a vacuum get brought into a home. What they take out is your data
Közzétéve: 2024. 11. 18. -
Why your vote can’t be “hacked,” with Cait Conley of CISA
Közzétéve: 2024. 11. 03. -
This industry profits from knowing you have cancer, explains Cody Venzke
Közzétéve: 2024. 10. 21. -
Exposing the Facebook funeral livestream scam
Közzétéve: 2024. 10. 07. -
San Francisco’s fight against deepfake porn, with City Attorney David Chiu
Közzétéve: 2024. 09. 23. -
What the arrest of Telegram's CEO means, with Eva Galperin
Közzétéve: 2024. 09. 09. -
Move over malware: Why one teen is more worried about AI (re-air)
Közzétéve: 2024. 08. 26. -
AI girlfriends want to know all about you. So might ChatGPT
Közzétéve: 2024. 08. 12. -
SIEM is not storage, with Jess Dodson
Közzétéve: 2024. 07. 29. -
How an AI “artist” stole a woman’s face, with Ali Diamond
Közzétéve: 2024. 07. 15. -
Busted for book club? Why cops want to see what you’re reading, with Sarah Lamdan
Közzétéve: 2024. 07. 01. -
(Almost) everything you always wanted to know about cybersecurity, but were too afraid to ask, with Tjitske de Vries
Közzétéve: 2024. 06. 17. -
800 arrests, 40 tons of drugs, and one backdoor, or what a phone startup gave the FBI, with Joseph Cox
Közzétéve: 2024. 06. 03.
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.