Transatlantic Cable podcast, episode 339
Episode 339 of the Kaspersky podcast looks at TikTok, spyware Reddit IPO and much more!
757 articles
Episode 339 of the Kaspersky podcast looks at TikTok, spyware Reddit IPO and much more!
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
Getting all the benefits of ChatGPT, Copilot, and Midjourney locally — without leaking your data to the internet.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Features of embedded systems and suitable protection methods for them.
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
How a recently discovered bug in Intel processors threatens cloud providers.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
A look at the pros and cons of updating Android — and ways to do it safely.
Adopting a Human Factor 360° model to assess the global cybersecurity landscape.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Examples of how QR codes in emails are used for phishing.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.