
Transatlantic Cable podcast, episode 274
In episode 274, we cover EU laws, Matt Damon, Biden cybersecurity changes, trains and more!
3252 articles
In episode 274, we cover EU laws, Matt Damon, Biden cybersecurity changes, trains and more!
An interesting bug in one of the most popular embedded DBMS.
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
Seriously, don’t do it. A Kaspersky study of malware spreading in China shows why it’s always a bad idea.
Episode 273 covers everything from a Microsoft leak to Netflix banning shared passwords and the first Metaverse nightclub!
What signs may indicate that a device is infected or being attacked by a hacker.
Introducing a bunch of new powerful features in Kaspersky VPN Secure Connection, which make the app even more convenient and helpful.
Hundreds of millions of dollars stolen: the five biggest heists in cryptocurrency history.
On this edition of the Kaspersky podcast, we discuss NFTs with Ivan Kwiatkowski in terms of what they are and if they are a scam.
Which corporate assets should be first in line for protection against cyberattacks?
Episode 272 looks at Kanye West & Parler, crimeware gangs using nation-state malware and gaming!
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
In this Kaspersky podcast, we sit down and discuss ethics during the times of cyberwar.
Episode 271 sees talk ranging from mistaken crypto millions to TikTok trackers and more!
Servers with the Zimbra Collaboration suit installed are being attacked via an archive unpacking tool.
Another modification of WhatsApp has turned out to be malicious. We explain what’s happened and how to stay protected.
The top-4 technologies in use today that long belong in a museum.
Although malware most often infiltrates corporate infrastructure through e-mail, it’s not the only infection method.
Episode 270 asks, what exactly is the ‘Metaverse’? Did Bruce Willis actually sell his image? And more!
We explain how the NullMixer dropper can download numerous Trojans onto a device.
How even high-end solutions for business can have “childish” bugs in their update delivery systems.