Lock and Code
Podcast autorstwa Malwarebytes - Niedziele
137 Odcinki
-
San Francisco’s fight against deepfake porn, with City Attorney David Chiu
Opublikowany: 23.09.2024 -
What the arrest of Telegram's CEO means, with Eva Galperin
Opublikowany: 9.09.2024 -
Move over malware: Why one teen is more worried about AI (re-air)
Opublikowany: 26.08.2024 -
AI girlfriends want to know all about you. So might ChatGPT
Opublikowany: 12.08.2024 -
SIEM is not storage, with Jess Dodson
Opublikowany: 29.07.2024 -
How an AI “artist” stole a woman’s face, with Ali Diamond
Opublikowany: 15.07.2024 -
Busted for book club? Why cops want to see what you’re reading, with Sarah Lamdan
Opublikowany: 1.07.2024 -
(Almost) everything you always wanted to know about cybersecurity, but were too afraid to ask, with Tjitske de Vries
Opublikowany: 17.06.2024 -
800 arrests, 40 tons of drugs, and one backdoor, or what a phone startup gave the FBI, with Joseph Cox
Opublikowany: 3.06.2024 -
Your vacation, reservations, and online dates, now chosen by AI
Opublikowany: 20.05.2024 -
"No social media 'til 16," and other fixes for a teen mental health crisis, with Dr. Jean Twenge
Opublikowany: 6.05.2024 -
Picking fights and gaining rights, with Justin Brookman
Opublikowany: 22.04.2024 -
Porn panic imperils privacy online, with Alec Muffett (re-air)
Opublikowany: 8.04.2024 -
Securing your home network is long, tiresome, and entirely worth it, with Carey Parker
Opublikowany: 25.03.2024 -
Going viral shouldn't lead to bomb threats, with Leigh Honeywell
Opublikowany: 11.03.2024 -
How to make a fake ID online, with Joseph Cox
Opublikowany: 26.02.2024 -
If only you had to worry about malware, with Jason Haddix
Opublikowany: 12.02.2024 -
Bruce Schneier predicts a future of AI-powered mass spying
Opublikowany: 29.01.2024 -
A true tale of virtual kidnapping
Opublikowany: 15.01.2024 -
DNA data deserves better, with Suzanne Bernstein
Opublikowany: 1.01.2024
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.