Transatlantic Cable podcast, episode 275
From the Raccoon malware creator on trial to Hushpuppi jailed for 11 years and more, it’s episode 275!
3883 articles
From the Raccoon malware creator on trial to Hushpuppi jailed for 11 years and more, it’s episode 275!
In episode 274, we cover EU laws, Matt Damon, Biden cybersecurity changes, trains and more!
An interesting bug in one of the most popular embedded DBMS.
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
Seriously, don’t do it. A Kaspersky study of malware spreading in China shows why it’s always a bad idea.
Episode 273 covers everything from a Microsoft leak to Netflix banning shared passwords and the first Metaverse nightclub!
What signs may indicate that a device is infected or being attacked by a hacker.
Introducing a bunch of new powerful features in Kaspersky VPN Secure Connection, which make the app even more convenient and helpful.
Hundreds of millions of dollars stolen: the five biggest heists in cryptocurrency history.
On this edition of the Kaspersky podcast, we discuss NFTs with Ivan Kwiatkowski in terms of what they are and if they are a scam.
Which corporate assets should be first in line for protection against cyberattacks?
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
Episode 272 looks at Kanye West & Parler, crimeware gangs using nation-state malware and gaming!
In this Kaspersky podcast, we sit down and discuss ethics during the times of cyberwar.
Episode 271 sees talk ranging from mistaken crypto millions to TikTok trackers and more!
We explain how attackers can steal your credentials and how you can prevent it.
Servers with the Zimbra Collaboration suit installed are being attacked via an archive unpacking tool.
Another modification of WhatsApp has turned out to be malicious. We explain what’s happened and how to stay protected.
The top-4 technologies in use today that long belong in a museum.
Although malware most often infiltrates corporate infrastructure through e-mail, it’s not the only infection method.