Transatlantic Cable podcast, episode 295
Episode 295 of the Transatlantic Cable is all about A.I this week, with talk around legislation, deepfakes and much more!
3273 articles
Episode 295 of the Transatlantic Cable is all about A.I this week, with talk around legislation, deepfakes and much more!
Image-generating neural networks are already everywhere. What privacy risks do they pose?
Linux and ESXi-based systems are increasingly falling victim to ransomware attacks. So how can you protect your servers?
Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from.
What enhancements to Kaspersky Safe Kids will help parents better manage their kids’ gadgets and screen time and encourage healthy digital habits?
Why you should update to the latest version of Google Chrome, Microsoft Edge, Opera, Yandex Browser, Vivaldi, Brave and other Chromium-based browsers.
Watch out! Fraudsters posing as FedEx employees and police officers could be scamming you – including via video-link.
Once again, very serious vulnerabilities have been found in Apple operating systems. Don’t delay updating to iOS 16.4.1 and macOS 13.3.1. Please note that updates are also available for iOS 15 and macOS 11 and 12.
Hackers are distributing the QBot trojan through business correspondence.
Better put them on something not very valuable or necessary. Here we explain why.
Apple Zero-days under attack, ChatGPT over sharing and Tesla sharing snafu – it’s the Transatlantic Cable podcast!
Open-source applications require proper implementation and maintenance; otherwise a company could face many threats. We highlight the key risks.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
Kaspersky experts discover a CLFS vulnerability being exploited by cybercriminals.
In this episode, the team discusses some weirdness at Twitter, AirTag used in murder, the Turkish ET, Doge on Twitter and more.
How to set up modern VPN services to significantly speed up the connection and access new content securely.
A method of stealing data from an air-gapped system through a speaker you may not even know is there.
Could someone be viewing your private photos while your device is being repaired?
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
Microsoft plans to throttle and block email from vulnerable Exchange servers to Exchange Online.
Cybercriminals are attacking 3CX VoIP telephony software users via trojanized applications.