
Transatlantic Cable podcast, episode 298
Episode 298 of the Transatlantic Cable podcast brings us such delights as ChatGPT data breach, social media scams and much more!
653 articles
Episode 298 of the Transatlantic Cable podcast brings us such delights as ChatGPT data breach, social media scams and much more!
On this edition of the Kaspersky podcast, Ahmed and Jeff discuss AI from finding phishing to should we stop and under $200 will buy you a deepfake.
Alternatives to Google Chrome that take data privacy more seriously.
Episode 296 is here and includes Bard, ChatGPT, BritGPT (yes, really) and Twitter verification woes. Tune in!
What happens to your digital assets after you die, and how to make sure they fall into the right hands before you do.
Once again, very serious vulnerabilities have been found in Apple operating systems. Don’t delay updating to iOS 16.4.1 and macOS 13.3.1. Please note that updates are also available for iOS 15 and macOS 11 and 12.
Scammers are using social engineering to shake down newly onboarded employees.
AI is going to have a tremendous impact on our lives. How can we get ready for it?
The metaverse, a virtual world where — as a digital avatar — you can visit places, shop for products, or subscribe to services, has become a media phenomenon in 2023. And while
Chances are your home already contains a few smart components. But can you make them even smarter so as to reap yet more benefits from them?
From the fridge to TV, how we’ll embrace the year of the virtual assistant in 2023 Decades ago, futurologists and TV shows such as ‘The Jetsons’ envisaged homes filled with
What web beacons and tracker pixels are, what’s so obnoxious about them, and how to disable them.
Cybercriminals are distributing a Trojan stealer under the guise of a ChatGPT desktop client for Windows. We delve into the details and ways to protect yourself.
A year after discovery, the Log4Shell vulnerability is still making itself felt.
Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.
We investigate the connection between software security and leaks when handling RAM.
In the final part of the series, we take a look at cryptocurrency politics, the future, and the metaverse.
Miners still pose a threat to businesses — especially ones that use cloud infrastructure.
Seriously, don’t do it. A Kaspersky study of malware spreading in China shows why it’s always a bad idea.
Hundreds of millions of dollars stolen: the five biggest heists in cryptocurrency history.