
Log4Shell a year on
A year after discovery, the Log4Shell vulnerability is still making itself felt.
640 articles
A year after discovery, the Log4Shell vulnerability is still making itself felt.
Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.
We investigate the connection between software security and leaks when handling RAM.
In the final part of the series, we take a look at cryptocurrency politics, the future, and the metaverse.
Miners still pose a threat to businesses — especially ones that use cloud infrastructure.
Seriously, don’t do it. A Kaspersky study of malware spreading in China shows why it’s always a bad idea.
Hundreds of millions of dollars stolen: the five biggest heists in cryptocurrency history.
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
Episode 270 asks, what exactly is the ‘Metaverse’? Did Bruce Willis actually sell his image? And more!
Summer is drawing to a close, which means it’s time to take stock. As part of the process, we prepared a report on what mainly occupied young minds online during
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
Using a recent study on hardware vulnerabilities in processors as an example, we contemplate the cost of security.
From possible sentient AI to leaky stalkerware and digital doubles – it’s episode 255 of the Transatlantic Cable!
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
From Bored Ape Yacht Club theft to fake reviews and facial recognition woes – its episode 248 of the Transatlantic Cable
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
From puppy fraud to creepy robots – it’s episode 246 of the Transatlantic Cable podcast.