Rephonic
Artwork for Lock and Code

Lock and Code

Malwarebytes
Cybersecurity
Data Privacy
Facebook
Privacy
Malwarebytes
Social Media
Google
Scams
Surveillance
Ransomware
Data Collection
Adolescent Mental Health Crisis
Smartphones
Online Tracking
Funeral Livestream Scam
Pig Butchering Scams
Anxiety
Depression
Artificial Intelligence
Online Scams

Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.

PublishesTwice monthlyEpisodes160Founded6 years ago
Number of ListenersCategories
Tech NewsNewsTechnology

Listen to this Podcast

Artwork for Lock and Code

Latest Episodes

In May of last year, a warning about AI came from somewhere unexpected: The Auschwitz-Birkenau State Museum.

Posting publicly on social media, the museum warned about a Facebook account using generative AI to create fake images of people who died in... more

Your prices could be going up because of a little something that one group has started calling the “cyber tax.”

Not a “tax” in any regulatory sense of the word, this newly named “cyber tax” is instead a consequence of the growing number of cyberatta... more

A dreadful thing happens far too often whenever an older adult falls for a scam: They get blamed for it. Not the scammers who lied and cheated their victim out of money. Not law enforcement for failing to recover funds. Not even the Big Tech companie... more

Big news: Lock and Code is nominated for a Webby Award! You can help us win the People’s Voice Award by voting here.

---

We have to talk about killer robots. No, not the Terminator, and not some Boston Dynamics robot run amok. We have to talk inste... more

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Hacking Humans
Hacking HumansN2K Networks
CyberWire Daily
CyberWire DailyN2K Networks
Click Here
Click HereRecorded Future News

Recent Guests

Eva Velasquez
CEO of the Identity Theft Resource Center
Identity Theft Resource Center
Episode: Cyberattacks are raising your prices (feat. Eva Velasquez)
Marti DeLiema
Assistant Professor at the University of Minnesota in the School of Social Work
University of Minnesota
Episode: Big Tech can stop scams. They just don’t (feat. Marti DeLiema)
Peter Asaro
Chair of the Campaign to Stop Killer Robots
Campaign to Stop Killer Robots
Episode: Killer robots are here. Now what? (feat. Peter Asaro)
Rachel Swan
Transportation reporter for The San Francisco Chronicle
The San Francisco Chronicle
Episode: This is all it takes to stop a train (feat. Rachel Swan)
Matthew Guariglia
Senior Policy Analyst
Electronic Frontier Foundation
Episode: Won't you see my neighbor? (feat. Matt Guariglia)
Zach Hinkle
Senior Social Media Manager for Malwarebytes
Malwarebytes
Episode: What can't you say on TikTok?
MinJi Pae
Social Media Content Creator for Malwarebytes
Malwarebytes
Episode: What can't you say on TikTok?
Lena Cohen
Staff Technologist at the Electronic Frontier Foundation
Electronic Frontier Foundation
Episode: Is your phone listening to you? (feat. Lena Cohen) (re-air)
Cory Doctorow
Author and digital rights activist
Episode: Enshittification is ruining everything online (feat. Cory Doctorow)

Host

David Ruiz
Host of Lock and Code

Reviews

4.8 out of 5 stars from 133 ratings
  • Hadn’t heard of pig butchering - but related

    Your shows are always so interesting. This one particularly hit. It wasn’t pig butchering specifically, but my husband got taken down by a group selling a trading platform for cryptos. Their method of getting your money was different. You login to their pretend crypto platform with impressive looking live charts. While your representative is on the line, you login to your bank to transfer money. They then have your bank login information. They login as you and drain your accounts. They nurture y... more

    Apple Podcasts
    5
    Liveinyourbody
    United States4 months ago
  • Great topics, great content

    Put a bark collar on Zack Hinkle. Shock him for every extraneous “like”.

    Apple Podcasts
    4
    “Like, cool, dude”
    United States10 months ago
  • So interesting but…

    This is an important app. So why the sing-song bedtime story presentation? Please… calm down.

    Apple Podcasts
    4
    Systrophe
    United Kingdoma year ago
  • I can’t do it

    I’d love to hear this podcast, but I can’t stand the host’s super-special voice. Can’t do it. It’s too bad.

    Apple Podcasts
    2
    KEnriquez1
    Canadaa year ago
  • Interview with gen Z teen was frustrating

    I was really intrigued by the questions that David introduced in the recent re-aired episode intro on the interview with Nitya. For context, I’m in my mid-twenties (cusp of gen Z and millennial) so I find the generational difference in online awareness really interesting. Thus, I found the interview with Nitya to be frustrating and boring. Her answers felt quite judgmental of others’ experiences with social media. No context was given on who she is - i understand her parents may want privacy but... more

    Apple Podcasts
    1
    nicholasname
    United States3 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners praise timely, focused coverage of privacy and security topics.
Guests and hosts are described as knowledgeable and credible.
Show is appreciated for accessible explanations of complex issues.
Some reviews note subjective or narrative presentation at times, but content remains engaging.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#250
United Kingdom/Technology

Talking Points

Recent interactions between the hosts and their guests.

Cyberattacks are raising your prices (feat. Eva Velasquez)
Q: What can small businesses do today to reduce risk and prepare for incidents?
Conduct a practical internal audit of data collection and storage, identify vulnerabilities, implement friction where appropriate (e.g., MFA, passkeys), and engage a broader support network including trusted organizations like FTC and the ITRC. Start with concrete steps rather than waiting for a perfect security posture, and treat cybersecurity as an ongoing business operation rather than a one-time fix.
Cyberattacks are raising your prices (feat. Eva Velasquez)
Q: What are the short- and long-term impacts of cybercrime on small businesses and their employees?
Small businesses face emotional strain, reputational damage, and financial pressure from attacks. They must manage disrupted operations, protect their employees' livelihoods, and communicate effectively with customers while trying to recover data and trust. In the long term, recovery often hinges on robust incident response, backups, and transparent communication to restore confidence.
Big Tech can stop scams. They just don’t (feat. Marti DeLiema)
Q: Who is susceptible to a financial scam?
Susceptibility spans all ages, but different types of scams target different groups; aging processes, social isolation, and changing financial needs influence risk, and the answer isn't one-size-fits-all, requiring tailored, repeated education.
This is all it takes to stop a train (feat. Rachel Swan)
Q: On that, is there anything being updated right now, and is there a schedule for the big upgrades like the new communications-based train control?
The host asks about current updates and scheduling; the guest explains there's awareness of ongoing improvements, but the timeline for the comprehensive upgrade remains uncertain and tightly tied to funding and political will.
Killer robots are here. Now what? (feat. Peter Asaro)
Q: Are we already at the point where these technologies can be deployed in warfare?
The episode suggests that the technology exists in various forms (e.g., autonomous drones, visual navigation, targeting algorithms), but deployment is constrained by social, ethical, and legal norms, as well as the need for human oversight in many scenarios.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Lock and Code

What is Lock and Code about and what kind of topics does it cover?

Audience tends to gravitate toward deep dives on privacy, surveillance, and technology policy, with a steady stream of interviews featuring researchers, policy advocates, and security practitioners. The show consistently covers how data collection, law enforcement tech, and platform design affect civil liberties and everyday technology use, often highlighting real-world cases and regulatory questions. A standout throughline is translating complex topics into practical privacy guidance and accountability discussions, making it helpful for listeners who want both context and actionable takeaways. The format tends to mix policy analysis with tech storytelling, and recurring guests from think tanks, advocacy groups, and tech companies add credi... more

Where can I find podcast stats for Lock and Code?

Rephonic provides a wide range of podcast stats for Lock and Code. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Lock and Code and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Lock and Code get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Lock and Code, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Lock and Code?

Rephonic provides comprehensive predictive audience data for Lock and Code, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Lock and Code have?

To see how many followers or subscribers Lock and Code has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Lock and Code?

These podcasts share a similar audience with Lock and Code:

1. Hacking Humans
2. CyberWire Daily
3. Click Here
4. Uncanny Valley | WIRED
5. The 404 Media Podcast

How many episodes of Lock and Code are there?

Lock and Code launched 6 years ago and published 160 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Lock and Code?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Lock and Code?

Rephonic pulls ratings and reviews for Lock and Code from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Lock and Code?

Rephonic provides full transcripts for episodes of Lock and Code. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Lock and Code?

Recent guests on Lock and Code include:

1. Eva Velasquez
2. Marti DeLiema
3. Peter Asaro
4. Rachel Swan
5. Matthew Guariglia
6. Zach Hinkle
7. MinJi Pae
8. Lena Cohen

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days