{"id":52101,"date":"2024-09-05T08:53:05","date_gmt":"2024-09-05T12:53:05","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=52101"},"modified":"2024-09-05T08:53:50","modified_gmt":"2024-09-05T12:53:50","slug":"transatlantic-cable-podcast-362","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-362\/52101\/","title":{"rendered":"Transatlantic Cable podcast, episode 362"},"content":{"rendered":"<p>Episode 362 of the Kaspersky podcast kicks off with discussion around Brazil\u2019s controversial decision to ban Elon Musk\u2019s X platform. From there the team discuss a story from the BBC around the theft of a voice actors voice, which was used on an A.I platform.<\/p>\n<p>To wrap up the team discuss how scammers are looking to use sextortion tactics in order for you to cough up bitcoin and Apple\u2019s big problem around \u2018face swap\u2019 apps and pornography.<\/p>\n<p>If you like what you heard, please consider subscribing.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.bbc.co.uk\/news\/articles\/crkmpe53l6jo\" target=\"_blank\" rel=\"nofollow noopener\">Top Brazil court upholds ban of Musk\u2019s X<\/a><\/li>\n<li><a href=\"https:\/\/www.bbc.co.uk\/news\/articles\/c3d9zv50955o\" target=\"_blank\" rel=\"nofollow noopener\">A tech firm stole our voices \u2013 then cloned and sold them<\/a><\/li>\n<li><a href=\"https:\/\/www.404media.co\/sextortion-scammers-try-to-scare-people-by-sending-photos-of-their-homes\/\" target=\"_blank\" rel=\"nofollow noopener\">Sextortion Scammers Try to Scare People by Sending Photos of Their Homes<\/a><\/li>\n<li><a href=\"https:\/\/www.404media.co\/apples-huge-dual-use-face-swap-app-problem-is-not-going-away\/\" target=\"_blank\" rel=\"nofollow noopener\">Apple\u2019s Huge \u201cDual Use\u201d Face Swap App Problem Is Not Going Away<\/a><\/li>\n<\/ul>\n<p><iframe src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/32907032\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/87A93A\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"https:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Episode 362 looks at X\u2019s recent ban, voice-over theft and Apple\u2019s big App store conundrum.<\/p>\n","protected":false},"author":437,"featured_media":52102,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[485],"class_list":{"0":"post-52101","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-podcast"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-362\/52101\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/437"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=52101"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52101\/revisions"}],"predecessor-version":[{"id":52107,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52101\/revisions\/52107"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/52102"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=52101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=52101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=52101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}