3202 articles
Miscommunication between a business and its information security service can lead to unnecessary losses. Today we try to work out how to overcome the communication barrier.
Episode 281 includes Twitter data breach, CryptoZoo fail, Silvergate woes and much more!
How to know if you’re facing a scam: we identify all the red flags in a recent scam that deployed a fake cryptocurrency exchange
Everybody knows that we should prepare ourselves for a “quantum future”, but it was expected to come about in 10-20 years’ time. Is a breakthrough possible this year?
The BlueNoroff APT group has adopted methods to bypass the Mark-of-the-Web mechanism
How to make sure a robot doesn’t spy on you, and can it function without internet access?
Episode 280 of the Transatlantic Cable includes, Twitter CEO voted out, spyware, Lego BrickLink vulnerabilities and Epic Games fined for privacy violations
Stealing data from an isolated network by manipulating the voltage switching converter.
Many hacks have started during Christmas holidays. A few simple tips will reduce the chances of your company becoming the next victim.
Researchers find a new reliable way to track the location of wireless Wi-Fi devices.
Why you shouldn’t trust a random period-tracking app, and what to look out for when choosing one.
Kaspersky VPN Secure Connection is the clear winner in tests of VPN performance, privacy, and transparency carried out by the independent IT-security research institute AV-TEST, and is recognized as the institute’s “Approved Virtual Private Network Solution”.
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
A year after discovery, the Log4Shell vulnerability is still making itself felt.
In episode 279 of the Transatlantic Cable, we cover Covid fraud, fake crypto apps, NSO group and much more!
Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.
We investigate the connection between software security and leaks when handling RAM.
Episode 278 includes the crypto implosion affecting nightclubs, a Twitter hack bigger than feared, and is Apple really spying on you?