137 Episodes

  1. Katie Moussouris hacked Clubhouse. Her emails went unanswered for weeks

    Published: 8/16/2021
  2. Disaster planning with Lesley Carhart, and the slim chance of a critical infrastructure “big one”

    Published: 8/2/2021
  3. “Seven or eight” zero-days: The failed race to fix Kaseya VSA, with Victor Gevers

    Published: 7/19/2021
  4. Racing against a real-life ransomware attack, with Ski Kacoroski

    Published: 7/6/2021
  5. Want to stop ransomware attacks? Send the cybercriminals to jail, says Brian Honan

    Published: 6/21/2021
  6. Can two VPN "wrongs" make a right?

    Published: 6/7/2021
  7. Shining a light on dark patterns with Carey Parker

    Published: 5/24/2021
  8. Alleviating ransomware's legal headaches with Jake Bernstein

    Published: 5/10/2021
  9. Breaking free from the VirusTotal silo

    Published: 4/26/2021
  10. Beating security fatigue with Troy Hunt, Chloé Messdaghi, and Tanya Janca

    Published: 4/12/2021
  11. Why you need to trust your VPN, with JP Taggart

    Published: 3/29/2021
  12. The Malwarebytes 2021 State of Malware report

    Published: 3/15/2021
  13. Defending online anonymity and speech with Eva Galperin

    Published: 3/1/2021
  14. Talking Emotet's takedown with Adam Kujawa

    Published: 2/15/2021
  15. Celebrating Data Privacy Day with Mozilla, DuckDuckGo, and EFF

    Published: 1/28/2021
  16. Lesson planning your school's cybersecurity with Doug Levin

    Published: 12/7/2020
  17. Tracking the charities that track you online with Chris Boyd

    Published: 11/23/2020
  18. Forecasting IoT cybersecurity with John Donovan and Adam Kujawa

    Published: 11/10/2020
  19. Finding consumer value in Cybersecurity Awareness Month with Jamie Court

    Published: 10/26/2020
  20. Discussing journalism's role in cybersecurity with Seth Rosenblatt and Alfred Ng

    Published: 10/12/2020

6 / 7

Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.