Transatlantic Cable podcast, episode 228
Emotet is back, some REvil arrests, and Twitter cryptovigilantes let loose — it’s all happening on this week’s Transatlantic Cable podcast.
966 articles
Emotet is back, some REvil arrests, and Twitter cryptovigilantes let loose — it’s all happening on this week’s Transatlantic Cable podcast.
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
If you receive an e-mail of dubious authenticity, analyze it yourself. Here’s how.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss a school using facial recognition for kids’ lunch payments, REvil being hacked again, more than $600 million in ransom payments, and more.
How attackers are most apt to get into target companies’ infrastructure.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Guard against ransomers who encrypt your files and demand payment for their safe return.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss a breach at T-Mobile, John Oliver’s rant on ransomware, garbage trucks finding Wi-Fi, and more.
Cybercriminals are offering ban-as-a-service for blocking Instagram users.
Why using a corporate mail account for personal matters is not a good idea
Received a confirmation e-mail for a purchase you didn’t make with a phone number to contact the company? Beware, it’s vishing.
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
In computer games, where does the money go — and what can you do about it?
Free office applications: OpenOffice, LibreOffice, iWork. Free cloud-based products, such as Google Docs, but with privacy settings. `, text: ` For working with documents, consider free office suites such as
Scammers pretend to represent brands on Twitter and lure customers onto phishing websites. Here’s how to avoid it.