Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s... more
Privacy is many things for many people.For the teenager suffering from a bad breakup, privacy is the ability to stop... more
Two weeks ago, the Lock and Code podcast shared three stories about home products that requested, collected, or exposed sensitive data online.There... more
The month, a consumer rights group out of the UK posed a question to the public that they’d likely never... more
The US presidential election is upon the American public, and with it come fears of “election interference.”But “election interference” is... more
On the internet, you can be shown an online ad because of your age, your address, your purchase history, your... more
Online scammers were seen this August stooping to a new low—abusing local funerals to steal from bereaved family and friends.Cybercrime... more
On August 15, the city of San Francisco launched an entirely new fight against the world of deepfake porn—it sued... more
On August 24, at an airport just outside of Paris, a man named Pavel Durov was detained for questioning by... more
Every age group uses the internet a little bit differently, and it turns out for at least one Gen Z... more
Somewhere out there is a romantic AI chatbot that wants to know everything about you. But in a revealing overlap,... more
In the world of business cybersecurity, the powerful technology known as “Security Information and Event Management” is sometimes thwarted by... more
Full-time software engineer and part-time Twitch streamer Ali Diamond is used to seeing herself on screen, probably because she’s the... more
More than 20 years ago, a law that the United States would eventually use to justify the warrantless collection of... more
🎶 Ready to know what Malwarebytes knows?Ask us your questions and get some answers.What is a passphrase and what makes it—what’s... more
This is a story about how the FBI got everything it wanted.For decades, law enforcement and intelligence agencies across the... more
The irrigation of the internet is coming.For decades, we’ve accessed the internet much like how we, so long ago, accessed... more
You’ve likely felt it: The dull pull downwards of a smartphone scroll. The “five more minutes” just before bed. The... more
Our Lock and Code host, David Ruiz, has a bit of an apology to make:“Sorry for all the depressing episodes.”When... more
A digital form of protest could become the go-to response for the world’s largest porn website as it faces increased... more
Few words apply as broadly to the public—yet mean as little—as “home network security.”For many, a “home network” is an... more
A disappointing meal at a restaurant. An ugly breakup between two partners. A popular TV show that kills off a... more
For decades, fake IDs had roughly three purposes: Buying booze before legally allowed, getting into age-restricted clubs, and, we can... more
If your IT and security teams think malware is bad, wait until they learn about everything else.In 2024, the modern... more
If the internet helped create the era of mass surveillance, then artificial intelligence will bring about an era of mass... more
On Thursday, December 28, at 8:30 pm in the Utah town of Riverdale, the city police began investigating what they... more
Hackers want to know everything about you: Your credit card number, your ID and passport info, and now, your DNA.On... more
It talks, it squawks, it even blocks! The stocking-stuffer on every hobby hacker’s wish list this year is the Flipper... more
Like the grade-school dweeb who reminds their teacher to assign tonight’s homework, or the power-tripping homeowner who threatens every neighbor... more
A worrying trend is cropping up amongst Americans, particularly within Generation Z—they're spying on each other more.Whether reading someone's DMs, rifling through a partner's text... more
In September, the Las Vegas casino and hotel operator MGM Resorts became a trending topic on social media... but for... more
What are you most worried about online? And what are you doing to stay safe? Depending on who you are, those... more
When you think of the modern tools that most invade your privacy, what do you picture?There's the obvious answers, like... more
In 2022, Malwarebytes investigated the blurry, shifting idea of “identity” on the internet, and how online identities are not only shaped... more
Becky Holmes is a big deal online. Hugh Jackman has invited her to dinner. Prince William has told her she has "such a beautiful name."... more
"Freedom" is a big word, and for many parents today, it's a word that includes location tracking. Across America, parents are snapping... more
Earlier this month, a group of hackers was spotted using a set of malicious tools—that originally gained popularity with online video... more
The language of a data breach, no matter what company gets hit, is largely the same. There's the stolen data—be... more
In the United States, when the police want to conduct a search on a suspected criminal, they must first obtain... more
When you think about the word "cyberthreat," what first comes to mind? Is it ransomware? Is it spyware? Maybe it's any... more
In May, a lawyer who was defending their client in a lawsuit against Columbia's biggest airline, Avianca, submitted a legal filing... more
On January 1, 2023, the Internet in Louisiana looked a little different than the Internet in Texas, Mississippi, and Arkansas—its... more
Ransomware is becoming bespoke, and that could mean trouble for businesses and law enforcement investigators. It wasn't always like this. For a... more
In January, a mental health nonprofit admitted that it had used Artificial Intelligence to help talk to people in distress. Prompted first... more
This week on Lock and Code, we speak with Bennett Cyphers about one largely unknown company's efforts to package and... more
This week on Lock and Code, we speak with Anna Pobletts about the "death" of passwords, and how passkeys can... more
Becky Holmes knows how to throw a romance scammer off script—simply bring up cannibalism. In January, Holmes shared on Twitter that... more
Government threats to end-to-end encryption—the technology that secures your messages and shared photos and videos—have been around for decades, but... more
In November of last year, the AI research and development lab OpenAI revealed its latest, most advanced language project: A... more
In 2020, a photo of a woman sitting on a toilet—her shorts pulled half-way down her thighs—was shared on Facebook,... more
Last month, the TikTok user TracketPacer posted a video online called “Network Engineering Facts to Impress No One at Zero Parties.” ... more
Becky Holmes knows how to throw a romance scammer off script—simply bring up cannibalism. In January, Holmes shared on Twitter that an account... more