Transatlantic Cable podcast, episode 142
On this podcast, Dave and Jeff talk with Rob Cataldo, chat about the latest with Zoom, report on nation-states spying on COVID-19 research, and more.
417 articles
On this podcast, Dave and Jeff talk with Rob Cataldo, chat about the latest with Zoom, report on nation-states spying on COVID-19 research, and more.
This week, David Jacoby joins Dave and Jeff to discuss his recent talk at SAS at Home, covidication, and more.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
When it comes to information security, we’re seeing the same mistakes over and over again.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
During a cyberattack in Hong Kong, LightSpy spyware infected the iPhones of people visiting counterfeit news sites.
Smartphones are always covered in bacteria, but viruses can also survive there, including COVID-19. We explain how to properly disinfect your smartphone.
MonitorMinor is one of the most dangerous spying apps for Android out there. Here’s why.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Victor Chebyshev talks about the most common mobile threats and attack vectors of 2019.
Inexpensive, no-fuss Burning Man tickets for sale online. Just one problem: They’re fake.
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
The ransomware app now uses infected devices to send SMS messages abroad on the victim’s dime.
Extorters are demanding ransom not in cryptocurrency, but in prepaid debit cards. All the same, you shouldn’t pay.
Our ICS CERT experts found 37 vulnerabilities in four VNC implementations. The developers have fixed most, but not all, of them.
Why stalkerware is a problem not only for targets, but also for security vendors – and what we’re doing to fix it.
Outsiders can penetrate your network through LAN sockets and devices in public areas.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
Victims of Yatron and FortuneCrypt ransomware can download a decryptor from the No More Ransom website to recover their encrypted files.