{"id":10346,"date":"2018-02-09T03:43:35","date_gmt":"2018-02-09T08:43:35","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-23\/10346\/"},"modified":"2020-08-28T11:51:48","modified_gmt":"2020-08-28T07:51:48","slug":"transatlantic-cable-podcast-23","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-23\/10346\/","title":{"rendered":"Transatlantic Cable podcast, episode 23"},"content":{"rendered":"<p>In this week\u2019s edition of the Transatlantic Cable podcast, Dave and I keep to our tradition of delivering the news in 20 minutes or less. During our discussion, we discuss Chinese police using facial recognition glasses (think Google Glass meets the Matrix), Ethereum scam via Twitter, iPhone source code on GitHub, and more.<\/p>\n<p>For more on this week\u2019s topics, see:<\/p>\n<ul>\n<li><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/a34g9j\/iphone-source-code-iboot-ios-leak\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">iPhone source code leaked to GitHub<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/cryptocurrency\/ethereum-scammers-make-5-000-in-a-night-by-impersonating-celebs-on-twitter\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Scamming Ethereum over Twitter<\/a><\/li>\n<li><a href=\"https:\/\/gizmodo.com\/chinas-dystopian-police-state-arms-cops-with-smart-glas-1822797047\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">China\u2019s surveillance glasses<\/a><\/li>\n<li><a href=\"https:\/\/www.theregister.co.uk\/2018\/02\/07\/boffins_crack_location_tracking_even_if_youve_turned_off_the_gps\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Is your phone tracking you?<\/a><\/li>\n<li><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/8xdayg\/iphone-zero-days-inside-azimuth-security\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Price of zero-day vulnerabilities<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/6238723\/height\/90\/theme\/custom\/autoplay\/no\/autonext\/no\/thumbnail\/yes\/preload\/no\/no_addthis\/no\/direction\/backward\/render-playlist\/no\/custom-color\/87A93A\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<p style=\"text-align: center\"><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-10128\" src=\"https:\/\/me-en.kaspersky.com\/blog\/files\/2018\/02\/badge_itunes-lrg.png\" alt=\"rss-podcasts\" width=\"110\" height=\"40\"><\/a> <a href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-10130\" src=\"https:\/\/me-en.kaspersky.com\/blog\/files\/2018\/02\/rss-podcasts1.png\" alt=\"rss-podcasts\" width=\"116\" height=\"40\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this week\u2019s edition of Kaspersky Lab\u2019s podcast, Jeff and Dave discuss a Ethereum scam in Twitter, China\u2019s surveillance glasses, and iPhone source code on GitHub.<\/p>\n","protected":false},"author":636,"featured_media":10347,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1225,1486],"tags":[1640,1504,1658,26,1183,444,695,1659],"class_list":{"0":"post-10346","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"category-threats","10":"tag-elon-musk","11":"tag-ethereum","12":"tag-github","13":"tag-iphone","14":"tag-leaks","15":"tag-podcast","16":"tag-scam","17":"tag-source-code"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-23\/10346\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-23\/12492\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/transatlantic-cable-podcast-23\/14642\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-23\/12936\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-23\/21124\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/transatlantic-cable-podcast-23\/19570\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-23\/19572\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=10346"}],"version-history":[{"count":13,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10346\/revisions"}],"predecessor-version":[{"id":17230,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10346\/revisions\/17230"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/10347"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=10346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=10346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=10346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}