Lock and Code
Podcast készítő Malwarebytes - Vasárnapok

Kategóriák:
128 Epizód
-
Your vacation, reservations, and online dates, now chosen by AI
Közzétéve: 2024. 05. 20. -
"No social media 'til 16," and other fixes for a teen mental health crisis, with Dr. Jean Twenge
Közzétéve: 2024. 05. 06. -
Picking fights and gaining rights, with Justin Brookman
Közzétéve: 2024. 04. 22. -
Porn panic imperils privacy online, with Alec Muffett (re-air)
Közzétéve: 2024. 04. 08. -
Securing your home network is long, tiresome, and entirely worth it, with Carey Parker
Közzétéve: 2024. 03. 25. -
Going viral shouldn't lead to bomb threats, with Leigh Honeywell
Közzétéve: 2024. 03. 11. -
How to make a fake ID online, with Joseph Cox
Közzétéve: 2024. 02. 26. -
If only you had to worry about malware, with Jason Haddix
Közzétéve: 2024. 02. 12. -
Bruce Schneier predicts a future of AI-powered mass spying
Közzétéve: 2024. 01. 29. -
A true tale of virtual kidnapping
Közzétéve: 2024. 01. 15. -
DNA data deserves better, with Suzanne Bernstein
Közzétéve: 2024. 01. 01. -
Meet the entirely legal, iPhone-crashing device: the Flipper Zero
Közzétéve: 2023. 12. 18. -
Why a ransomware gang tattled on its victim, with Allan Liska
Közzétéve: 2023. 12. 04. -
Defeating Little Brother requires a new outlook on privacy
Közzétéve: 2023. 11. 06. -
MGM attack is too late a wake-up call for businesses, says James Fair
Közzétéve: 2023. 10. 23. -
AI sneak attacks, location spying, and definitely not malware, or, what one teenager fears online
Közzétéve: 2023. 10. 09. -
What does a car need to know about your sex life?
Közzétéve: 2023. 09. 25. -
Re-air: What teenagers face growing up online
Közzétéve: 2023. 09. 11. -
"An influx of Elons," a hospital visit, and magic men: Becky Holmes shares more romance scams
Közzétéve: 2023. 08. 28. -
A new type of "freedom," or, tracking children with AirTags, with Heather Kelly
Közzétéve: 2023. 08. 14.
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.