Transatlantic Cable podcast, episode 15
In this week’s edition Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss a North Carolina county victimized by ransomware, Apple Face ID, and more.
1118 articles
In this week’s edition Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss a North Carolina county victimized by ransomware, Apple Face ID, and more.
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
In this week’s Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff look at cryptokittens, password pains, 2-factor authentication earrings and much more.
In this week’s edition Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss the company’s security predictions for 2018.
In today’s Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss Germany destroying smartwatches, Detroit community Wi-Fi and hacked cars.
In this week’s edition of Kaspersky Lab’s Transatlantic Cable podcast, we discuss IoT security in toys for children and adults.
We’re launching the Global Transparency Initiative. What is it? Eugene Kaspersky explains.
Eugene Kaspersky responds in detail to recent allegations about his company and the Russian government.
The real scale of the Yahoo breach (spoiler: 3 billion), Facebook’s own Face ID, UK Lottery DDoS, and more.
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
Transatlantic Cable Podcast episode 2: autonomous pizza delivery, Sarahah’s privacy issues, reprieve for victims of Yahoo!’s data breach and more.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Microsoft changes its approach to cybersecurity solutions in response to partner feedback
What do movie characters typically do when there is a door with an electronic lock on their way? They call a hacker, of course. The hacker connects some sort of contraption to the lock. During the next several seconds, the device picks every possible combination and shows it on its (obligatory, bright) segment display. Voilà! The door is open.
Many of us talk on Skype, Hangouts, WhatsApp, or Viber while using the computer for something else. You already know it’s not very polite, but it can be dangerous as well. Your conversation partner might find out what you are typing.
A recap of the most important events in the cybersecurity industry and Kaspersky Lab’s history for the last 20 years.
Many users of Android devices sooner or later are tempted to root them. Here we discuss the advantages and disadvantages of having root permissions on Android devices — and if your device should be rooted at all.
We’re witnessing an outbreak of a new breed of cryptomalware. Our experts have named it ExPetr (others call it Petya, PetrWrap, and some other names). The key difference with this new ransomware is that this time, criminals have chosen their targets with greater precision: Most of the victims are businesses, not consumers.
Do you use Snapchat? If so, you may want to take a deeper look at the Snap Map feature released earlier this week.