Lock and Code artwork

Lock and Code

114 episodes - English - Latest episode: 13 days ago -

Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.

Technology
Homepage Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

Busted for book club? Why cops want to see what you’re reading, with Sarah Lamdan

July 01, 2024 01:00 - 54 minutes - 74.9 MB

More than 20 years ago, a law that the United States would eventually use to justify the warrantless collection of Americans’ phone call records actually started out as a warning sign against an entirely different target: Libraries. Not two months after terrorists attacked the United States on September 11, 2001, Congress responded with the passage of The USA Patriot Act. Originally championed as a tool to fight terrorism, The Patriot Act, as introduced, allowed the FBI to request “any tang...

(Almost) everything you always wanted to know about cybersecurity, but were too afraid to ask, with Tjitske de Vries

June 17, 2024 01:00 - 39 minutes - 90.1 MB

🎶 Ready to know what Malwarebytes knows? Ask us your questions and get some answers. What is a passphrase and what makes it—what’s the word? Strong? 🎶 Every day, countless readers, listeners, posters, and users ask us questions about some of the most commonly cited topics and terminology in cybersecurity. What are passkeys? Is it safer to use a website or an app? How can I stay safe from a ransomware attack? What is the dark web? And why can’t cybercriminals simply be caught and stopped?...

800 arrests, 40 tons of drugs, and one backdoor, or what a phone startup gave the FBI, with Joseph Cox

June 03, 2024 01:00 - 51 minutes - 70.6 MB

This is a story about how the FBI got everything it wanted. For decades, law enforcement and intelligence agencies across the world have lamented the availability of modern technology that allows suspected criminals to hide their communications from legal scrutiny. This long-standing debate has sometimes spilled into the public view, as it did in 2016, when the FBI demanded that Apple unlock an iPhone used during a terrorist attack in the California city of San Bernardino. Apple pushed back...

Your vacation, reservations, and online dates, now chosen by AI

May 20, 2024 01:00 - 47 minutes - 65.4 MB

The irrigation of the internet is coming. For decades, we’ve accessed the internet much like how we, so long ago, accessed water—by traveling to it. We connected (quite literally), we logged on, and we zipped to addresses and sites to read, learn, shop, and scroll.  Over the years, the internet was accessible from increasingly more devices, like smartphones, smartwatches, and even smart fridges. But still, it had to be accessed, like a well dug into the ground to pull up the water below. ...

Your vacation, reservations, and online dates, now chosen by AI: Lock and Code S05E11

May 20, 2024 01:00 - 47 minutes - 65.4 MB

The irrigation of the internet is coming. For decades, we’ve accessed the internet much like how we, so long ago, accessed water—by traveling to it. We connected (quite literally), we logged on, and we zipped to addresses and sites to read, learn, shop, and scroll.  Over the years, the internet was accessible from increasingly more devices, like smartphones, smartwatches, and even smart fridges. But still, it had to be accessed, like a well dug into the ground to pull up the water below. ...

"No social media 'til 16," and other fixes for a teen mental health crisis, with Dr. Jean Twenge

May 06, 2024 01:00 - 45 minutes - 61.8 MB

You’ve likely felt it: The dull pull downwards of a smartphone scroll. The “five more minutes” just before bed. The sleep still there after waking. The edges of your calm slowly fraying. After more than a decade of our most recent technological experiment, in turns out that having the entirety of the internet in the palm of your hands could be … not so great. Obviously, the effects of this are compounded by the fact that the internet that was built after the invention of the smartphone is a...

Tracing what went wrong in 2012 for today’s teens, with Dr. Jean Twenge

May 06, 2024 01:00 - 45 minutes - 61.8 MB

You’ve likely felt it: The dull pull downwards of a smartphone scroll. The “five more minutes” just before bed. The sleep still there after waking. The edges of your calm slowly fraying. After more than a decade of our most recent technological experiment, in turns out that having the entirety of the internet in the palm of your hands could be … not so great. Obviously, the effects of this are compounded by the fact that the internet that was built after the invention of the smartphone is a...

Picking fights and gaining rights, with Justin Brookman

April 22, 2024 01:00 - 46 minutes - 63.5 MB

Our Lock and Code host, David Ruiz, has a bit of an apology to make: “Sorry for all the depressing episodes.” When the Lock and Code podcast explored online harassment and abuse this year, our guest provided several guidelines and tips for individuals to lock down their accounts and remove their sensitive information from the internet, but larger problems remained. Content moderation is failing nearly everywhere, and data protection laws are unequal across the world. When we told the true...

Porn panic imperils privacy online, with Alec Muffett (re-air)

April 08, 2024 01:00 - 47 minutes - 110 MB

A digital form of protest could become the go-to response for the world’s largest porn website as it faces increased regulations: Not letting people access the site. In March, PornHub blocked access to visitors connecting to its website from Texas. It marked the second time in the past 12 months that the porn giant shut off its website to protest new requirements in online age verification. The Texas law, which was signed in June 2023, requires several types of adult websites to verify the...

Securing your home network is long, tiresome, and entirely worth it, with Carey Parker

March 25, 2024 01:00 - 45 minutes - 62.6 MB

Few words apply as broadly to the public—yet mean as little—as “home network security.” For many, a “home network” is an amorphous thing. It exists somewhere between a router, a modem, an outlet, and whatever cable it is that plugs into the wall. But the idea of a “home network” doesn’t need to intimidate, and securing that home network could be simpler than many folks realize. For starters, a home network can be simply understood as a router—which is the device that provides access to the...

Going viral shouldn't lead to bomb threats, with Leigh Honeywell

March 11, 2024 01:00 - 42 minutes - 96.4 MB

A disappointing meal at a restaurant. An ugly breakup between two partners. A popular TV show that kills off a beloved, main character. In a perfect world, these are irritations and moments of vulnerability. But online today, these same events can sometimes be the catalyst for hate. That disappointing meal can produce a frighteningly invasive Yelp review that exposes a restaurant owner’s home address for all to see. That ugly breakup can lead to an abusive ex posting a video of revenge porn...

How to make a fake ID online, with Joseph Cox

February 26, 2024 01:00 - 36 minutes - 83.6 MB

For decades, fake IDs had roughly three purposes: Buying booze before legally allowed, getting into age-restricted clubs, and, we can only assume, completing nation-state spycraft for embedded informants and double agents. In 2024, that’s changed, as the uses for fake IDs have become enmeshed with the internet. Want to sign up for a cryptocurrency exchange where you’ll use traditional funds to purchase and exchange digital currency? You’ll likely need to submit a photo of your real ID so t...

If only you had to worry about malware, with Jason Haddix

February 12, 2024 01:00 - 40 minutes - 55.5 MB

If your IT and security teams think malware is bad, wait until they learn about everything else. In 2024, the modern cyberattack is a segmented, prolonged, and professional effort, in which specialists create strictly financial alliances to plant malware on unsuspecting employees, steal corporate credentials, slip into business networks, and, for a period of days if not weeks, simply sit and watch and test and prod, escalating their privileges while refraining from installing any noisy hack...

Bruce Schneier predicts a future of AI-powered mass spying

January 29, 2024 01:00 - 26 minutes - 35.9 MB

If the internet helped create the era of mass surveillance, then artificial intelligence will bring about an era of mass spying. That’s the latest prediction from noted cryptographer and computer security professional Bruce Schneier, who, in December, shared a vision of the near future where artificial intelligence—AI—will be able to comb through reams of surveillance data to answer the types of questions that, previously, only humans could.   “Spying is limited by the need for human labor...

A true tale of virtual kidnapping

January 15, 2024 01:00 - 18 minutes - 25.4 MB

On Thursday, December 28, at 8:30 pm in the Utah town of Riverdale, the city police began investigating what they believed was a kidnapping. 17-year-old foreign exchange student Kai Zhuang was missing, and according to Riverdale Police Chief Casey Warren, Zhuang was believed to be “forcefully taken” from his home, and “being held against his will.” The evidence leaned in police’s favor. That night, Zhuang’s parents in China reportedly received a photo of Zhuang in distress. They’d also rec...

DNA data deserves better, with Suzanne Bernstein

January 01, 2024 01:00 - 37 minutes - 51.5 MB

Hackers want to know everything about you: Your credit card number, your ID and passport info, and now, your DNA. On October 1 2023, on a hacking website called BreachForums, a group of cybercriminals claimed that they had stolen—and would soon sell—individual profiles for users of the genetic testing company 23andMe. 23andMe offers direct-to-consumer genetic testing kits that provide customers with different types of information, including potential indicators of health risks along with r...

Meet the entirely legal, iPhone-crashing device: the Flipper Zero

December 18, 2023 01:00 - 36 minutes - 49.6 MB

It talks, it squawks, it even blocks! The stocking-stuffer on every hobby hacker’s wish list this year is the Flipper Zero. “Talk” across low-frequency radio to surreptitiously change TV channels, emulate garage door openers, or even pop open your friend’s Tesla charging port without their knowing! “Squawk” with the Flipper Zero’s mascot and user-interface tour guide, a “cyber-dolphin” who can “read” the minds of office key fobs and insecure hotel entry cards. And, introducing in 2023, bloc...

Why a ransomware gang tattled on its victim, with Allan Liska

December 04, 2023 01:00 - 35 minutes - 48.5 MB

Like the grade-school dweeb who reminds their teacher to assign tonight’s homework, or the power-tripping homeowner who threatens every neighbor with an HOA citation, the ransomware group ALPHV can now add itself to a shameful roster of pathetic, little tattle-tales. In November, the ransomware gang ALPHV, which also goes by the name Black Cat, notified the US Securities and Exchange Commission about the Costa Mesa-based software company MeridianLink, alleging that the company had failed to...

Defeating Little Brother requires a new outlook on privacy

November 06, 2023 01:00 - 45 minutes - 62.2 MB

A worrying trend is cropping up amongst Americans, particularly within Generation Z—they're spying on each other more. Whether reading someone's DMs, rifling through a partner's text messages, or even rummaging through the bags and belongings of someone else, Americans enjoy keeping tabs on one another, especially when they're in a relationship. According to recent research from Malwarebytes, a shocking 49% of Gen Zers agreed or strongly agreed with the statement: “Being able to track my sp...

MGM attack is too late a wake-up call for businesses, says James Fair

October 23, 2023 01:00 - 40 minutes - 55.1 MB

In September, the Las Vegas casino and hotel operator MGM Resorts became a trending topic on social media... but for all the wrong reasons. A TikTok user posted a video taken from inside the casino floor of the MGM Grand—the company's flagship hotel complex near the southern end of the Las Vegas strip—that didn't involve the whirring of slot machines or the sirens and buzzers of sweepstake earnings, but, instead, row after row of digital gambling machines with blank, non-functional screens. ...

AI sneak attacks, location spying, and definitely not malware, or, what one teenager fears online

October 09, 2023 01:00 - 47 minutes - 65 MB

What are you most worried about online? And what are you doing to stay safe?  Depending on who you are, those could be very different answers, but for teenagers and members of Generation Z, the internet isn't so scary because of traditional threats like malware and viruses. Instead, the internet is scary because of what it can expose. To Gen Z, a feared internet is one that is vindictive and cruel—an internet that reveals private information that Gen Z fears could harm their relationships w...

What does a car need to know about your sex life?

September 25, 2023 01:00 - 43 minutes - 60.1 MB

When you think of the modern tools that most invade your privacy, what do you picture? There's the obvious answers, like social media platforms including Facebook and Instagram. There's email and "everything" platforms like Google that can track your locations, your contacts, and, of course, your search history. There's even the modern web itself, rife with third-party cookies that track your browsing activity across websites so your information can be bundled together into an ad-friendly p...

Re-air: What teenagers face growing up online

September 11, 2023 01:00 - 36 minutes - 50.2 MB

In 2022, Malwarebytes investigated the blurry, shifting idea of “identity” on the internet, and how online identities are not only shaped by the people behind them, but also inherited by the internet’s youngest users, children. Children have always inherited some of their identities from their parents—consider that two of the largest indicators for political and religious affiliation in the US are, no surprise, the political and religious affiliations of someone’s parents—but the transfer of...

"An influx of Elons," a hospital visit, and magic men: Becky Holmes shares more romance scams

August 28, 2023 01:00 - 51 minutes - 118 MB

Becky Holmes is a big deal online.  Hugh Jackman has invited her to dinner. Prince William has told her she has "such a beautiful name." Once, Ricky Gervais simply needed her photos ("I want you to take a snap of yourself and then send it to me on here...Send it to me on here!" he messaged on Twitter), and even Tom Cruise slipped into her DMs (though he was a tad boring, twice asking about her health and more often showing a core misunderstanding of grammar).  Becky has played it cool, mos...

A new type of "freedom," or, tracking children with AirTags, with Heather Kelly

August 13, 2023 23:00 - 37 minutes - 51.6 MB

"Freedom" is a big word, and for many parents today, it's a word that includes location tracking.  Across America, parents are snapping up Apple AirTags, the inexpensive location tracking devices that can help owners find lost luggage, misplaced keys, and—increasingly so—roving toddlers setting out on mini-adventures.  The parental fear right now, according to The Washington Post technology reporter Heather Kelly, is that "anybody who can walk, therefore can walk away."  Parents wanting t...

How Apple fixed what Microsoft hasn't, with Thomas Reed

July 31, 2023 01:00 - 40 minutes - 55.2 MB

Earlier this month, a group of hackers was spotted using a set of malicious tools—that originally gained popularity with online video game cheaters—to hide their Windows-based malware from being detected. Sounds unique, right?  Frustratingly, it isn't, as the specific security loophole that was abused by the hackers has been around for years, and Microsoft's response, or lack thereof, is actually a telling illustration of the competing security environments within Windows and macOS. Even m...

Spy vs. spy: Exploring the LetMeSpy hack, with maia arson crimew

July 17, 2023 01:00 - 38 minutes - 53.2 MB

The language of a data breach, no matter what company gets hit, is largely the same. There's the stolen data—be it email addresses, credit card numbers, or even medical records. There are the users—unsuspecting, everyday people who, through no fault of their own, mistakenly put their trust into a company, platform, or service to keep their information safe. And there are, of course, the criminals. Some operate in groups. Some act alone. Some steal data as a means of extortion. Others steal i...

Of sharks, surveillance, and spied-on emails: This is Section 702, with Matthew Guariglia

July 03, 2023 03:00 - 43 minutes - 59.3 MB

In the United States, when the police want to conduct a search on a suspected criminal, they must first obtain a search warrant. It is one of the foundational rights given to US persons under the Constitution, and a concept that has helped create the very idea of a right to privacy at home and online.  But sometimes, individualized warrants are never issued, never asked for, never really needed, depending on which government agency is conducting the surveillance, and for what reason. Every ...

Why businesses need a disinformation defense plan, with Lisa Kaplan: Lock and Code S04E13

June 19, 2023 03:00 - 42 minutes - 57.9 MB

When you think about the word "cyberthreat," what first comes to mind? Is it ransomware? Is it spyware? Maybe it's any collection of the infamous viruses, worms, Trojans, and botnets that have crippled countless companies throughout modern history.  In the future, though, what many businesses might first think of is something new: Disinformation.  Back in 2021, in speaking about threats to businesses, the former director of the US Cybersecurity and Infrastructure Security Agency, Chris Kre...

Trusting AI not to lie: The cost of truth

June 05, 2023 03:00 - 43 minutes - 60.1 MB

In May, a lawyer who was defending their client in a lawsuit against Columbia's biggest airline, Avianca, submitted a legal filing before a court in Manhattan, New York, that listed several previous cases as support for their main argument to continue the lawsuit. But when the court reviewed the lawyer's citations, it found something curious: Several were entirely fabricated.  The lawyer in question had gotten the help of another attorney who, in scrounging around for legal precedent to ci...

Identity crisis: How an anti-porn crusade could jam the Internet, featuring Alec Muffett

May 22, 2023 03:00 - 47 minutes - 65.1 MB

On January 1, 2023, the Internet in Louisiana looked a little different than the Internet in Texas, Mississippi, and Arkansas—its next-door state neighbors. And on May 1, the Internet in Utah looked quite different, depending on where you looked, than the Internet in Arizona, or Idaho, or Nevada, or California or Oregon or Washington or, really, much of the rest of the United States.  The changes are, ostensibly, over pornography.  In Louisiana, today, visitors to the online porn site Porn...

The rise of "Franken-ransomware," with Allan Liska

May 08, 2023 03:00 - 51 minutes - 70.1 MB

Ransomware is becoming bespoke, and that could mean trouble for businesses and law enforcement investigators.  It wasn't always like this.  For a few years now, ransomware operators have congregated around a relatively new model of crime called "Ransomware-as-a-Service." In the Ransomware-as-a-Service model, or RaaS model, ransomware itself is not delivered to victims by the same criminals that make the ransomware. Instead, it is used almost "on loan" by criminal groups called "affiliates"...

Removing the human: When should AI be used in emotional crisis?

April 24, 2023 01:00 - 41 minutes - 56.3 MB

In January, a mental health nonprofit admitted that it had used Artificial Intelligence to help talk to people in distress.  Prompted first by a user's longing for personal improvement—and the difficulties involved in that journey—the AI tool generated a reply, which, with human intervention, could be sent verbatim in a chat box, or edited and fine-tuned to better fit the situation. The AI said: “I hear you. You’re trying to become a better person and it’s not easy. It’s hard to make chang...

How the cops buy a "God view" of your location data, with Bennett Cyphers

April 10, 2023 03:00 - 46 minutes - 63.5 MB

The list of people and organizations that are hungry for your location data—collected so routinely and packaged so conveniently that it can easily reveal where you live, where you work, where you shop, pray, eat, and relax—includes many of the usual suspects. Advertisers, obviously, want to send targeted ads to you and they believe those ads have a better success rate if they're sent to, say, someone who spends their time at a fast-food drive-through on the way home from the office, as oppo...

Solving the password’s hardest problem with passkeys, featuring Anna Pobletts

March 27, 2023 03:00 - 38 minutes - 52.4 MB

How many passwords do you have? If you're at all like our Lock and Code host David Ruiz, that number hovers around 200. But the important follow up question is: How many of those passwords can you actually remember on your own? Prior studies suggest a number that sounds nearly embarrassing—probably around six.  After decades of requiring it, it turns out that the password has problems, the biggest of which is that when users are forced to create a password for every online account, they res...

"Brad Pitt," a still body, ketchup, and a knife, or the best trick ever played on a romance scammer, with Becky Holmes

March 13, 2023 03:00 - 48 minutes - 110 MB

Becky Holmes knows how to throw a romance scammer off script—simply bring up cannibalism.  In January, Holmes shared on Twitter that an account with the name "Thomas Smith" had started up a random chat with her that sounded an awful lot like the beginnins stages of a romance scam. But rather than instantly ignoring and blocking the advances—as Holmes recommends everyone do in these types of situations—she first had a little fun.  "I was hoping that you'd let me eat a small part of you when...

Fighting censorship online, or, encryption’s latest surprise use-case, with Mallory Knodel

February 27, 2023 03:00 - 59 minutes - 81.4 MB

Government threats to end-to-end encryption—the technology that secures your messages and shared photos and videos—have been around for decades, but the most recent threats to this technology are unique in how they intersect with a broader, sometimes-global effort to control information on the Internet. Take two efforts in the European Union and the United Kingdom. New proposals there would require companies to scan any content that their users share with one another for Child Sexual Abuse ...

What is AI ”good” at (and what the heck is it, actually), with Josh Saxe

February 13, 2023 03:00 - 44 minutes - 103 MB

In November of last year, the AI research and development lab OpenAI revealed its latest, most advanced language project: A tool called ChatGPT. ChatGPT is so much more than "just" a chatbot. As users have shown with repeated testing and prodding, ChatGPT seems to "understand" things.  It can give you recipes that account for whatever dietary restrictions you have. It can deliver basic essays about moments in history. It can—and has been—used to cheat by university students who are giving a...

A private moment, caught by a Roomba, ended up on Facebook. Eileen Guo explains how

January 30, 2023 03:00 - 46 minutes - 105 MB

In 2020, a photo of a woman sitting on a toilet—her shorts pulled half-way down her thighs—was shared on Facebook, and it was shared by someone whose job it was to look at that photo and, by labeling the objects in it, help train an artificial intelligence system for a vacuum. Bizarre? Yes. Unique? No.  In December, MIT Technology Review investigated the data collection and sharing practices of the company iRobot, the developer of the popular self-automated Roomba vacuums. In their reporti...

Fighting tech’s gender gap with TracketPacer

January 16, 2023 03:00 - 53 minutes - 123 MB

Last month, the TikTok user TracketPacer posted a video online called “Network Engineering Facts to Impress No One at Zero Parties.”  TracketPacer regularly posts fun, educational content about how the Internet operates. The account is run by a network engineer named Lexie Cooper, who has worked in a network operations center, or NOC, and who’s earned her Cisco Certified Network Associate certificate, or CCNA.  In the video, Cooper told listeners about the first spam email being sent over A...

Why does technology no longer excite?

January 01, 2023 03:00 - 43 minutes - 98.5 MB

When did technology last excite you?  If Douglas Adams, author of The Hitchhiker's Guide to the Galaxy, is to be believed, your own excitement ended, simply had to end, after turning 35 years old. Decades ago, at first writing privately and later having those private writings published after his death, Adams had come up with "a set of rules that describe our reactions to technologies." They were simple and short:  Anything that is in the world when you’re born is normal and ordinary and is...

Chasing cryptocurrency through cyberspace, with Brian Carter

December 19, 2022 00:00 - 47 minutes - 108 MB

On June 7, 2021, the US Department of Justice announced a breakthrough: Less than one month after the oil and gas pipeline company Colonial Pipeline had paid its ransomware attackers roughly $4.4 million in bitcoin in exchange for a decryption key that would help the company get its systems back up and running, the government had in turn found where many of those bitcoins had gone, clawing back a remarkable $2.3 million from the cybercriminals. In cybercrime, this isn't supposed to happen—o...

Security advisories are falling short. Here’s why, with Dustin Childs

December 05, 2022 00:00 - 41 minutes - 95.5 MB

Decades ago, patching was, to lean into a corny joke, a bit patchy.  In the late 90s, the Microsoft operating system (OS) Windows 98 had a supportive piece of software that would find security patches for the OS so that users could then download those patches and deploy them to their computers. That software was simply called Windows Update.  But Windows Update had two big problems. One, it had to be installed by a user—if a user was unaware of Windows Update, then they were also likely un...

Threat hunting: How MDR secures your business

November 21, 2022 00:00 - 59 minutes - 81.7 MB

A cyberattack is not the same thing as malware—in fact, malware itself is typically the last stage of an attack, the punctuation mark that closes out months of work from cybercriminals who have infiltrated a company, learned about its systems and controls, and slowly spread across its network through various tools, some of which are installed on a device entirely by default.  The goal of cybersecurity, though, isn't to recover after an attack, it's to stop an attack before it happens.  On ...

How student surveillance fails everyone

November 07, 2022 00:00 - 44 minutes - 102 MB

Last month, when Malwarebytes published joint research with 1Password about the online habits of parents and teenagers today, we spoke with a Bay Area high school graduate on the Lock and Code podcast about how she spends her days online and what she thinks are the hardest parts about growing up with the Internet. And while we learned a lot in that episode—about time management, about comparing one's self to others, and about what gets lost when kids swap in-person time with online time—we d...

A gym heist in London goes cyber

October 24, 2022 01:00 - 25 minutes - 57.5 MB

A thief has been stalking London.  This past summer, multiple women reported similar crimes to the police: While working out at their local gyms, someone snuck into the locker rooms, busted open their locks, stole their rucksacks and gym bags, and then, within hours, purchased thousands of pounds of goods. Apple, Selfridges, Balenciaga, Harrod's—the thief has expensive taste.  At first blush, the crimes sound easy to explain: A thief stole credit cards and used them in person at various st...

Teen talk: What it’s like to grow up online, and the role of parents

October 10, 2022 10:00 - 58 minutes - 133 MB

Growing up is different for teens today.  Issues with identity, self-expression, bullying, fitting in, and trusting your friends and family—while all those certainly existed decades ago, they were never magnified in quite the same way that they are today, and that's largely because of one enormous difference: The Internet.  On the Internet, the lines of friendship are re-enforced and blurred by comments or likes on photos and videos. Bullying can reach outside of schools, in harmful texts ...

Calling in the ransomware negotiator, with Kurtis Minder

September 26, 2022 01:00 - 43 minutes - 98.5 MB

Ransomware can send any company into crisis.  Immediately following an attack, the notoriously disruptive malware can spread across networks and machines, locking up important files and rendering vital data almost useless for all employees. As we learned in a previous episode of Lock and Code, a ransomware attack not only threatens an organization's clients and external customers, but all the internal teams who are just trying to do their jobs. When Northshore School District was hit severa...

The MSP playbook on deciphering tech promises and shaping security culture

September 12, 2022 01:00 - 44 minutes - 102 MB

The in-person cybersecurity conference has returned. More than two years after Covid-19 pushed nearly every in-person event online, cybersecurity has returned to the exhibition hall. In San Francisco earlier this year, thousands of cybersecurity professionals walked the halls of Moscone Center at RSA 2022. In Las Vegas just last month, even more hackers, security experts, and tech enthusiasts flooded the Mandalay Bay hotel, attending the conferences Black Hat and DEFCON.  And at nearly all...

Playing Doom on a John Deere tractor with Sick Codes

August 29, 2022 03:00 - 41 minutes - 94.7 MB

In 1993, the video game developers at id Software released Doom, a first-person shooter that placed a nameless protagonist into the fiery depths of hell, equipped with an arsenal of weapons to mow down imps, demons, lost souls, and the intimidating "Barons of Hell."  In 2022, the hacker Sick Codes installed a modified version of Doom on the smart control panel of a John Deere tractor, with the video game's nameless protagonist this time mowing down something entirely more apt for the situat...

Twitter Mentions

@deathtospinach 2 Episodes
@shannonvallor 1 Episode