Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Care Phone Number, sometimes the users face some Customernical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Customer Care Phone Number, ++1 877-852-473O US/CA
…
continue reading
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Service Phone Number, sometimes the users face some Customernical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Customer Service Phone Number +1 877-852-4730 US/CA and let them solve your issues easily!
…
continue reading
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Care Phone Number, sometimes the users face some Customernical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Customer Care Phone Number +1 877-852-4730 US/CA and let them solve your issues easily!
…
continue reading
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Tech support Phone Number, sometimes the users face some Customernical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Tech Support Phone Number, ++1 877-852-4730 US/CA
…
continue reading
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Tech support Phone Number, sometimes the users face some Customernical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Tech support Phone Number +1 877-852-4730 US/CA and let them solve your issues easily!
…
continue reading
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Tech Support Phone Number +1 866-760-7833 US/CA and let them solve your issues easily!
…
continue reading
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Tech Support Phone Number +1 866-688-9269 US/CA and let them solve your issues easily!
…
continue reading
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Support Phone Number, sometimes the ukers face some Customer issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Customer Support Phone Number +0 121-828-2311 UK/CA and let them solve your issues easily!
…
continue reading
📲MÁLWAREBYTES 📲+1800(821)2090 Helpline Number📲 KLKKR24x7 📲MÁLWAREBYTES HELPLINE 📲+18008212090📲Contact Number📲 KLKKR 📲MÁLWAREBYTES TECHNICAL 📲+18008212090📲Support Contact Number📲 KLLLR calling about an issue with your MÁLWAREBYTES TECH support support phone number TV care, the representative will transfer you to the TV MÁLWAREBYTES TECH support support phone number team. No matter what issue you are calling about, the MÁLWAREBYTES TECH support and TECH support team will be able to help you re ...
…
continue reading
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Care Phone Number, sometimes the users face some Customer Technical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Customer Care Phone Number, ++1 8O5{5O6}55O2 US/CA MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Care Ph ...
…
continue reading
Contact our MALWAREBYTES Customer Care Phone number +1:805:(874):7479 and solve the MALWAREBYTES mail & Desktop Gold App-related problems within a minute. Our MALWAREBYTES Support number +1:805:(874):7479 provide MALWAREBYTES customer Care on Phoenix, billing, account backup, mail account recovery, account information changes, Fixing the MALWAREBYTES account problem, MALWAREBYTES Desktop gold app issues etc. You can get MALWAREBYTES customer Care and technical support by toll-free MALWAREBYT ...
…
continue reading
MALWAREBYTES Customer Support +44(808-178-2987)Phone’ Number What Is The MALWAREBYTES Customer Support Phone’ Number? What Is The MALWAREBYTES Customer Support Phone’ Number? Assuming you are referring to AT&T/MALWAREBYTES, the customer service number is How to Contact MALWAREBYTES Customer Support Phone’ Number MALWAREBYTES is a leading provider of telecommunications and internet services. They offer a wide range of products and services to their customers, including Customer support. If yo ...
…
continue reading
MALWAREBYTES Helpline phone Number, 44808‒178‒2987 MALWAREBYTES Helpline phone number helpline phone Number, toll free Number, Customer care Number, Helpline Number, Helpdesk Number, Helpline phone Number, Helpline Number, Login Issue, Helpline phone Number l MALWAREBYTES Helpline phone Number, 44808‒178‒2987 MALWAREBYTES Helpline phone number helpline Number, toll free Number, Customer care Number, Helpline Number, Helpdesk Number, Helpline phone Number, Helpline phone Number, Login Issue, ...
…
continue reading
MALWAREBYTESCustomer support phone Number, (800)-747-2725 MALWAREBYTESCustomer support phone number helpline phone Number, toll free Number, Customer care Number, Customer support Number, Helpdesk Number, Customer support phone Number, Customer support Number, Login Issue, Customer support phone Number l MALWAREBYTESCustomer support phone Number, (800)-747-2725 MALWAREBYTESCustomer support phone number helpline Number, toll free Number, Customer care Number, Customer support Number, Helpdesk ...
…
continue reading
MALWAREBYTES Support phone Number, 1866‒688‒9269 MALWAREBYTES Technical Support phone number helpline phone Number, toll free Number, technical care Number, technical support Number, Helpdesk Number, Technical Support phone Number, Tech Support Number, Login Issue, Technical Support phone Number l MALWAREBYTES Support phone Number, 1866‒688‒9269 MALWAREBYTES Technical Support phone number helpline Number, toll free Number, technical care Number, technical support Number, Helpdesk Number, Tec ...
…
continue reading
MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Customer Support phone number helpline phone Number, toll free Number, Customer care Number, Customer support Number, Helpdesk Number, Customer Support phone Number, Customer Support Number, Login Issue, Customer Support phone Number l MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Customer Support phone number helpline Number, toll free Number, Customer care Number, Customer support Number, Helpdesk Number, Custo ...
…
continue reading
MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Technical Support phone number helpline phone Number, toll free Number, technical care Number, technical support Number, Helpdesk Number, Technical Support phone Number, Technical Support Number, Login Issue, Technical Support phone Number l MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Technical Support phone number helpline Number, toll free Number, technical care Number, technical support Number, Helpdesk Numb ...
…
continue reading
MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Cox email Support phone number helpline phone Number, toll free Number, Cox email care Number, Cox email support Number, Helpdesk Number, Cox email Support phone Number, Customer Support Number, Login Issue, Cox email Support phone Number l MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Cox email Support phone number helpline Number, toll free Number, Cox email care Number, Cox email support Number, Helpdesk Numbe ...
…
continue reading
MÁLWAREBYTES Support phone Number, 44808‒178‒2987 MÁLWAREBYTES Cox email Support phone number helpline phone Number, toll free Number, Cox email care Number, Cox email support Number, Helpdesk Number, Cox email Support phone Number, Customer Support Number, Login Issue, Cox email Support phone Number l MÁLWAREBYTES Support phone Number, 44808‒178‒2987 MÁLWAREBYTES Cox email Support phone number helpline Number, toll free Number, Cox email care Number, Cox email support Number, Helpdesk Numbe ...
…
continue reading
MALWAREBYTES Tech support phone Number, 44808‒178‒2987 MALWAREBYTES Tech support phone number helpline phone Number, toll free Number, Customer care Number, Tech support Number, Helpdesk Number, Tech support phone Number, Tech support Number, Login Issue, Tech support phone Number l MALWAREBYTES Tech support phone Number, 44808‒178‒2987 MALWAREBYTES Tech support phone number helpline Number, toll free Number, Customer care Number, Tech support Number, Helpdesk Number, Tech support phone Numb ...
…
continue reading
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
…
continue reading

1
Did DOGE "breach" Americans' data? (feat. Sydney Saubestre)
36:30
36:30
Play later
Play later
Lists
Like
Liked
36:30If you don’t know about the newly created US Department of Government Efficiency (DOGE), there’s a strong chance they already know about you. Created on January 20 by US President Donald Trump through Executive Order, DOGE’s broad mandate is “modernizing Federal technology and software to maximize governmental efficiency and productivity.” To fulfi…
…
continue reading

1
Is your phone listening to you? (feat. Lena Cohen)
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10It has probably happened to you before. You and a friend are talking—not texting, not DMing, not FaceTiming—but talking, physically face-to-face, about, say, an upcoming vacation, a new music festival, or a job offer you just got. And then, that same week, you start noticing some eerily specific ads. There’s the Instagram ad about carry-on luggage,…
…
continue reading

1
What Google Chrome knows about you, with Carey Parker
50:14
50:14
Play later
Play later
Lists
Like
Liked
50:14Google Chrome is, by far, the most popular web browser in the world. According to several metrics, Chrome accounts for anywhere between 52% and 66% of the current global market share for web browser use. At that higher estimate, that means that, if the 5.5 billion internet users around the world were to open up a web browser right now, 3.6 billion …
…
continue reading

1
How ads weirdly know your screen brightness, headphone jack use, and location, with Tim Shott
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52Something’s not right in the world of location data. In January, a location data broker named Gravy Analytics was hacked, with the alleged cybercriminal behind the attack posting an enormous amount of data online as proof. Though relatively unknown to most of the public, Gravy Analytics is big in the world of location data collection, and, accordin…
…
continue reading

1
Surveillance pricing is "evil and sinister," explains Justin Kloczko
28:06
28:06
Play later
Play later
Lists
Like
Liked
28:06Insurance pricing in America makes a lot of sense so long as you’re one of the insurance companies. Drivers are charged more for traveling long distances, having low credit, owning a two-seater instead of a four, being on the receiving end of a car crash, and—increasingly—for any number of non-determinative data points that insurance companies use …
…
continue reading

1
A suicide reveals the lonely side of AI chatbots, with Courtney Brown
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28In February 2024, a 14-year-old boy from Orlando, Florida, committed suicide after confessing his love to the one figure who absorbed nearly all of his time—an AI chatbot. For months, Sewell Seltzer III had grown attached to an AI chatbot modeled after the famous “Game of Thrones” character Daenerys Targaryen. The Daenerys chatbot was not a license…
…
continue reading
It’s Data Privacy Week right now, and that means, for the most part, that you’re going to see a lot of well-intentioned but clumsy information online about how to protect your data privacy. You’ll see articles about iPhone settings. You’ll hear acronyms for varying state laws. And you’ll probably see ads for a variety of apps, plug-ins, and online …
…
continue reading

1
The new rules for AI and encrypted messaging, with Mallory Knodel
47:06
47:06
Play later
Play later
Lists
Like
Liked
47:06The era of artificial intelligence everything is here, and with it, come everyday surprises into exactly where the next AI tools might pop up. There are major corporations pushing customer support functions onto AI chatbots, Big Tech platforms offering AI image generation for social media posts, and even Google has defaulted to include AI-powered o…
…
continue reading
You can see it on X. You can see on Instagram. It’s flooding community pages on Facebook and filling up channels on YouTube. It’s called “AI slop” and it’s the fastest, laziest way to drive engagement. Like “click bait” before it (“You won’t believe what happens next,” reads the trickster headline), AI slop can be understood as the latest online ta…
…
continue reading

1
A day in the life of a privacy pro, with Ron de Jesus
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44Privacy is many things for many people. For the teenager suffering from a bad breakup, privacy is the ability to stop sharing her location and to block her ex on social media. For the political dissident advocating against an oppressive government, privacy is the protection that comes from secure, digital communications. And for the California resi…
…
continue reading

1
These cars want to know about your sex life (re-air)
44:59
44:59
Play later
Play later
Lists
Like
Liked
44:59Two weeks ago, the Lock and Code podcast shared three stories about home products that requested, collected, or exposed sensitive data online. There were the air fryers that asked users to record audio through their smartphones. There was the smart ring maker that, even with privacy controls put into place, published data about users’ stress levels…
…
continue reading

1
An air fryer, a ring, and a vacuum get brought into a home. What they take out is your data
26:59
26:59
Play later
Play later
Lists
Like
Liked
26:59The month, a consumer rights group out of the UK posed a question to the public that they’d likely never considered: Were their air fryers spying on them? By analyzing the associated Android apps for three separate air fryer models from three different companies, a group of researchers learned that these kitchen devices didn’t just promise to make …
…
continue reading

1
Why your vote can’t be “hacked,” with Cait Conley of CISA
39:33
39:33
Play later
Play later
Lists
Like
Liked
39:33The US presidential election is upon the American public, and with it come fears of “election interference.” But “election interference” is a broad term. It can mean the now-regular and expected foreign disinformation campaigns that are launched to sow political discord or to erode trust in American democracy. It can include domestic campaigns to d…
…
continue reading

1
This industry profits from knowing you have cancer, explains Cody Venzke
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07On the internet, you can be shown an online ad because of your age, your address, your purchase history, your politics, your religion, and even your likelihood of having cancer. This is because of the largely unchecked “data broker” industry. Data brokers are analytics and marketing companies that collect every conceivable data point that exists ab…
…
continue reading

1
Exposing the Facebook funeral livestream scam
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28Online scammers were seen this August stooping to a new low—abusing local funerals to steal from bereaved family and friends. Cybercrime has never been a job of morals (calling it a “job” is already lending it too much credit), but, for many years, scams wavered between clever and brusque. Take the “Nigerian prince” email scam which has plagued vic…
…
continue reading

1
San Francisco’s fight against deepfake porn, with City Attorney David Chiu
20:54
20:54
Play later
Play later
Lists
Like
Liked
20:54On August 15, the city of San Francisco launched an entirely new fight against the world of deepfake porn—it sued the websites that make the abusive material so easy to create. “Deepfakes,” as they’re often called, are fake images and videos that utilize artificial intelligence to swap the face of one person onto the body of another. The technology…
…
continue reading

1
What the arrest of Telegram's CEO means, with Eva Galperin
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03On August 24, at an airport just outside of Paris, a man named Pavel Durov was detained for questioning by French investigators. Just days later, the same man was charged in crimes related to the distribution of child pornography and illicit transactions, such as drug trafficking and fraud. Durov is the CEO and founder of the messaging and communic…
…
continue reading

1
Move over malware: Why one teen is more worried about AI (re-air)
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39Every age group uses the internet a little bit differently, and it turns out for at least one Gen Z teen in the Bay Area, the classic approach to cyberecurity—defending against viruses, ransomware, worms, and more—is the least of her concerns. Of far more importance is Artificial Intelligence (AI). Today, the Lock and Code podcast with host David R…
…
continue reading

1
AI girlfriends want to know all about you. So might ChatGPT
40:34
40:34
Play later
Play later
Lists
Like
Liked
40:34Somewhere out there is a romantic AI chatbot that wants to know everything about you. But in a revealing overlap, other AI tools—which are developed and popularized by far larger companies in technology—could crave the very same thing. For AI tools of any type, our data is key. In the nearly two years since OpenAI unveiled ChatGPT to the public, th…
…
continue reading

1
CIS Controls - Version 8.1 Update Overview
52:09
52:09
Play later
Play later
Lists
Like
Liked
52:09With the release of NIST Cybersecurity Framework 2.0, CIS felt strongly that an update to The Controls was necessary to crossmap to CSF 2.0. Specifically the strongest driver, was the release of the Govern function. Co-hosts: Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/ Brian Blakely: https://www.linkedin.com/in/bblakley/ Eric Wo…
…
continue reading
In the world of business cybersecurity, the powerful technology known as “Security Information and Event Management” is sometimes thwarted by the most unexpected actors—the very people setting it up. Security Information and Event Management—or SIEM—is a term used to describe data-collecting products that businesses rely on to make sense of everyth…
…
continue reading

1
How an AI “artist” stole a woman’s face, with Ali Diamond
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13Full-time software engineer and part-time Twitch streamer Ali Diamond is used to seeing herself on screen, probably because she’s the one who turns the camera on. But when Diamond received a Direct Message (DM) on Twitter earlier this year, she learned that her likeness had been recreated across a sample of AI-generated images, entirely without her…
…
continue reading

1
Busted for book club? Why cops want to see what you’re reading, with Sarah Lamdan
54:33
54:33
Play later
Play later
Lists
Like
Liked
54:33More than 20 years ago, a law that the United States would eventually use to justify the warrantless collection of Americans’ phone call records actually started out as a warning sign against an entirely different target: Libraries. Not two months after terrorists attacked the United States on September 11, 2001, Congress responded with the passage…
…
continue reading

1
(Almost) everything you always wanted to know about cybersecurity, but were too afraid to ask, with Tjitske de Vries
39:22
39:22
Play later
Play later
Lists
Like
Liked
39:22🎶 Ready to know what Malwarebytes knows? Ask us your questions and get some answers. What is a passphrase and what makes it—what’s the word? Strong? 🎶 Every day, countless readers, listeners, posters, and users ask us questions about some of the most commonly cited topics and terminology in cybersecurity. What are passkeys? Is it safer to use a web…
…
continue reading

1
800 arrests, 40 tons of drugs, and one backdoor, or what a phone startup gave the FBI, with Joseph Cox
51:25
51:25
Play later
Play later
Lists
Like
Liked
51:25This is a story about how the FBI got everything it wanted. For decades, law enforcement and intelligence agencies across the world have lamented the availability of modern technology that allows suspected criminals to hide their communications from legal scrutiny. This long-standing debate has sometimes spilled into the public view, as it did in 2…
…
continue reading

1
Your vacation, reservations, and online dates, now chosen by AI
47:36
47:36
Play later
Play later
Lists
Like
Liked
47:36The irrigation of the internet is coming. For decades, we’ve accessed the internet much like how we, so long ago, accessed water—by traveling to it. We connected (quite literally), we logged on, and we zipped to addresses and sites to read, learn, shop, and scroll. Over the years, the internet was accessible from increasingly more devices, like sma…
…
continue reading

1
"No social media 'til 16," and other fixes for a teen mental health crisis, with Dr. Jean Twenge
45:00
45:00
Play later
Play later
Lists
Like
Liked
45:00You’ve likely felt it: The dull pull downwards of a smartphone scroll. The “five more minutes” just before bed. The sleep still there after waking. The edges of your calm slowly fraying. After more than a decade of our most recent technological experiment, in turns out that having the entirety of the internet in the palm of your hands could be … no…
…
continue reading

1
Picking fights and gaining rights, with Justin Brookman
46:13
46:13
Play later
Play later
Lists
Like
Liked
46:13Our Lock and Code host, David Ruiz, has a bit of an apology to make: “Sorry for all the depressing episodes.” When the Lock and Code podcast explored online harassment and abuse this year, our guest provided several guidelines and tips for individuals to lock down their accounts and remove their sensitive information from the internet, but larger p…
…
continue reading

1
Porn panic imperils privacy online, with Alec Muffett (re-air)
47:56
47:56
Play later
Play later
Lists
Like
Liked
47:56A digital form of protest could become the go-to response for the world’s largest porn website as it faces increased regulations: Not letting people access the site. In March, PornHub blocked access to visitors connecting to its website from Texas. It marked the second time in the past 12 months that the porn giant shut off its website to protest n…
…
continue reading

1
Securing your home network is long, tiresome, and entirely worth it, with Carey Parker
45:35
45:35
Play later
Play later
Lists
Like
Liked
45:35Few words apply as broadly to the public—yet mean as little—as “home network security.” For many, a “home network” is an amorphous thing. It exists somewhere between a router, a modem, an outlet, and whatever cable it is that plugs into the wall. But the idea of a “home network” doesn’t need to intimidate, and securing that home network could be si…
…
continue reading

1
Going viral shouldn't lead to bomb threats, with Leigh Honeywell
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26A disappointing meal at a restaurant. An ugly breakup between two partners. A popular TV show that kills off a beloved, main character. In a perfect world, these are irritations and moments of vulnerability. But online today, these same events can sometimes be the catalyst for hate. That disappointing meal can produce a frighteningly invasive Yelp …
…
continue reading

1
How to make a fake ID online, with Joseph Cox
36:49
36:49
Play later
Play later
Lists
Like
Liked
36:49For decades, fake IDs had roughly three purposes: Buying booze before legally allowed, getting into age-restricted clubs, and, we can only assume, completing nation-state spycraft for embedded informants and double agents. In 2024, that’s changed, as the uses for fake IDs have become enmeshed with the internet. Want to sign up for a cryptocurrency …
…
continue reading

1
If only you had to worry about malware, with Jason Haddix
40:41
40:41
Play later
Play later
Lists
Like
Liked
40:41If your IT and security teams think malware is bad, wait until they learn about everything else. In 2024, the modern cyberattack is a segmented, prolonged, and professional effort, in which specialists create strictly financial alliances to plant malware on unsuspecting employees, steal corporate credentials, slip into business networks, and, for a…
…
continue reading

1
Bruce Schneier predicts a future of AI-powered mass spying
26:27
26:27
Play later
Play later
Lists
Like
Liked
26:27If the internet helped create the era of mass surveillance, then artificial intelligence will bring about an era of mass spying. That’s the latest prediction from noted cryptographer and computer security professional Bruce Schneier, who, in December, shared a vision of the near future where artificial intelligence—AI—will be able to comb through r…
…
continue reading
On Thursday, December 28, at 8:30 pm in the Utah town of Riverdale, the city police began investigating what they believed was a kidnapping. 17-year-old foreign exchange student Kai Zhuang was missing, and according to Riverdale Police Chief Casey Warren, Zhuang was believed to be “forcefully taken” from his home, and “being held against his will.”…
…
continue reading

1
DNA data deserves better, with Suzanne Bernstein
37:47
37:47
Play later
Play later
Lists
Like
Liked
37:47Hackers want to know everything about you: Your credit card number, your ID and passport info, and now, your DNA. On October 1 2023, on a hacking website called BreachForums, a group of cybercriminals claimed that they had stolen—and would soon sell—individual profiles for users of the genetic testing company 23andMe. 23andMe offers direct-to-consu…
…
continue reading

1
Meet the entirely legal, iPhone-crashing device: the Flipper Zero
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26It talks, it squawks, it even blocks! The stocking-stuffer on every hobby hacker’s wish list this year is the Flipper Zero. “Talk” across low-frequency radio to surreptitiously change TV channels, emulate garage door openers, or even pop open your friend’s Tesla charging port without their knowing! “Squawk” with the Flipper Zero’s mascot and user-i…
…
continue reading

1
Why a ransomware gang tattled on its victim, with Allan Liska
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34Like the grade-school dweeb who reminds their teacher to assign tonight’s homework, or the power-tripping homeowner who threatens every neighbor with an HOA citation, the ransomware group ALPHV can now add itself to a shameful roster of pathetic, little tattle-tales. In November, the ransomware gang ALPHV, which also goes by the name Black Cat, not…
…
continue reading

1
Defeating Little Brother requires a new outlook on privacy
45:37
45:37
Play later
Play later
Lists
Like
Liked
45:37A worrying trend is cropping up amongst Americans, particularly within Generation Z—they're spying on each other more. Whether reading someone's DMs, rifling through a partner's text messages, or even rummaging through the bags and belongings of someone else, Americans enjoy keeping tabs on one another, especially when they're in a relationship. Ac…
…
continue reading

1
MGM attack is too late a wake-up call for businesses, says James Fair
40:26
40:26
Play later
Play later
Lists
Like
Liked
40:26In September, the Las Vegas casino and hotel operator MGM Resorts became a trending topic on social media... but for all the wrong reasons. A TikTok user posted a video taken from inside the casino floor of the MGM Grand—the company's flagship hotel complex near the southern end of the Las Vegas strip—that didn't involve the whirring of slot machin…
…
continue reading

1
AI sneak attacks, location spying, and definitely not malware, or, what one teenager fears online
47:38
47:38
Play later
Play later
Lists
Like
Liked
47:38What are you most worried about online? And what are you doing to stay safe? Depending on who you are, those could be very different answers, but for teenagers and members of Generation Z, the internet isn't so scary because of traditional threats like malware and viruses. Instead, the internet is scary because of what it can expose. To Gen Z, a fe…
…
continue reading

1
What does a car need to know about your sex life?
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04When you think of the modern tools that most invade your privacy, what do you picture? There's the obvious answers, like social media platforms including Facebook and Instagram. There's email and "everything" platforms like Google that can track your locations, your contacts, and, of course, your search history. There's even the modern web itself, …
…
continue reading

1
Re-air: What teenagers face growing up online
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50In 2022, Malwarebytes investigated the blurry, shifting idea of “identity” on the internet, and how online identities are not only shaped by the people behind them, but also inherited by the internet’s youngest users, children. Children have always inherited some of their identities from their parents—consider that two of the largest indicators for…
…
continue reading

1
"An influx of Elons," a hospital visit, and magic men: Becky Holmes shares more romance scams
51:46
51:46
Play later
Play later
Lists
Like
Liked
51:46Becky Holmes is a big deal online. Hugh Jackman has invited her to dinner. Prince William has told her she has "such a beautiful name." Once, Ricky Gervais simply needed her photos ("I want you to take a snap of yourself and then send it to me on here...Send it to me on here!" he messaged on Twitter), and even Tom Cruise slipped into her DMs (thoug…
…
continue reading

1
A new type of "freedom," or, tracking children with AirTags, with Heather Kelly
37:52
37:52
Play later
Play later
Lists
Like
Liked
37:52"Freedom" is a big word, and for many parents today, it's a word that includes location tracking. Across America, parents are snapping up Apple AirTags, the inexpensive location tracking devices that can help owners find lost luggage, misplaced keys, and—increasingly so—roving toddlers setting out on mini-adventures. The parental fear right now, ac…
…
continue reading

1
How Apple fixed what Microsoft hasn't, with Thomas Reed
40:29
40:29
Play later
Play later
Lists
Like
Liked
40:29Earlier this month, a group of hackers was spotted using a set of malicious tools—that originally gained popularity with online video game cheaters—to hide their Windows-based malware from being detected. Sounds unique, right? Frustratingly, it isn't, as the specific security loophole that was abused by the hackers has been around for years, and Mi…
…
continue reading

1
CIS Control 18 - Penetration Testing - Sponsored by Hacket Cyber
1:06:26
1:06:26
Play later
Play later
Lists
Like
Liked
1:06:26Penetration testing is something that more companies and organizations should be considering a necessary expense. Pen Testing is an important aspect of discovery and identifying potential critical vulnerabilities within your organizations external network, internal network, applications, or systems. They provide a valuable insight on how your digit…
…
continue reading

1
Spy vs. spy: Exploring the LetMeSpy hack, with maia arson crimew
39:03
39:03
Play later
Play later
Lists
Like
Liked
39:03The language of a data breach, no matter what company gets hit, is largely the same. There's the stolen data—be it email addresses, credit card numbers, or even medical records. There are the users—unsuspecting, everyday people who, through no fault of their own, mistakenly put their trust into a company, platform, or service to keep their informat…
…
continue reading

1
Of sharks, surveillance, and spied-on emails: This is Section 702, with Matthew Guariglia
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26In the United States, when the police want to conduct a search on a suspected criminal, they must first obtain a search warrant. It is one of the foundational rights given to US persons under the Constitution, and a concept that has helped create the very idea of a right to privacy at home and online. But sometimes, individualized warrants are neve…
…
continue reading

1
Why businesses need a disinformation defense plan, with Lisa Kaplan: Lock and Code S04E13
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26When you think about the word "cyberthreat," what first comes to mind? Is it ransomware? Is it spyware? Maybe it's any collection of the infamous viruses, worms, Trojans, and botnets that have crippled countless companies throughout modern history. In the future, though, what many businesses might first think of is something new: Disinformation. Ba…
…
continue reading