
The life and death of Adobe Flash
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
653 articles
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
Episode 270 asks, what exactly is the ‘Metaverse’? Did Bruce Willis actually sell his image? And more!
Summer is drawing to a close, which means it’s time to take stock. As part of the process, we prepared a report on what mainly occupied young minds online during
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
Using a recent study on hardware vulnerabilities in processors as an example, we contemplate the cost of security.
From possible sentient AI to leaky stalkerware and digital doubles – it’s episode 255 of the Transatlantic Cable!
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
From Bored Ape Yacht Club theft to fake reviews and facial recognition woes – its episode 248 of the Transatlantic Cable
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
From puppy fraud to creepy robots – it’s episode 246 of the Transatlantic Cable podcast.
We reveal more cunning cybercriminal tricks and explain how to guard against scams.
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!
How to protect your iPhone or Android smartphone from Pegasus and similar mobile APTs.
Here’s how to configure cookies in Chrome, Safari, Firefox and Edge.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
This week on the Kaspersky podcast, Dave and Jeff discuss how a fat-fingered mistake cost an NFT owner a lot of money, Instagram improvements for teens, Log4J, and more.