Transatlantic Cable podcast, episode 143
This week Dave and Jeff take a look at a leaked Google Doc that the NHS would like to take back, unemployment scams in the US, a Star Wars–Top Gun mash-up, and more.
628 articles
This week Dave and Jeff take a look at a leaked Google Doc that the NHS would like to take back, unemployment scams in the US, a Star Wars–Top Gun mash-up, and more.
On this podcast, Dave and Jeff talk with Rob Cataldo, chat about the latest with Zoom, report on nation-states spying on COVID-19 research, and more.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
A long time ago in a galaxy far, far away, a lone Mandalorian warrior suffered from cybersecurity issues, both other people’s fault and his own.
Payment terminals and ATMs in remote locations require a special approach to security.
Using services and programs that IT doesn’t know about causes problems. We explain how to avoid them.
We explain how to hide private data in images properly, without making rookie mistakes.
Dave and Jeff discuss privacy with Marco Preuss, the latest on Zoom, burning 5G down in the UK, and more.
Ten smart mobile games and educational apps for your child to enjoy and benefit from.
Dave and Jeff discuss scammers’ use of coronavirus, facial recognition on college campuses, Comcast leaking unlisted contact details of 200,000 customers, and more.
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
A brief but comprehensive guide to security and privacy on the world’s most popular gaming platform.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Listen to your cookies with the Listening Back browser extension to understand the real scale of Web tracking.
If you don’t want to pay for extra gigabytes in iCloud, try these other ways to backup your photos and other iPhone files.
Dave and Jeff discuss the EU’s response to Facebook’s pleas for regulation, ransomware shutting down a US energy company, Ring requiring 2FA, and more.
Victor Chebyshev talks about the most common mobile threats and attack vectors of 2019.
We tell you which security and privacy settings will hold Twitter hackers and spammers at bay.