{"id":17919,"date":"2021-01-21T14:16:46","date_gmt":"2021-01-21T10:16:46","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-183\/17919\/"},"modified":"2021-01-21T14:16:46","modified_gmt":"2021-01-21T10:16:46","slug":"transatlantic-cable-podcast-183","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-183\/17919\/","title":{"rendered":"Transatlantic Cable podcast, episode 183"},"content":{"rendered":"<p>For the 183<sup>rd<\/sup> edition of the <a href=\"https:\/\/www.kaspersky.com\/blog\/?s=podcast\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky <em>Transatlantic Cable<\/em> podcast<\/a>, Jeff and I look at some of the big news stories doing the rounds in the field of cybersecurity.<\/p>\n<p>We begin again with the recent Capitol Hill attacks, and this time, a news story suggesting that House Speaker Nancy Pelosi\u2019s laptop was stolen. The story goes on to suggest that it\u2019s possible the thief was planning to sell it to Russia, but details are sparse.<\/p>\n<p>Following that, we look at how controversial app Parler could soon make a comeback to Apple\u2019s App Store. Tim Cook recently said the social network could return if it committed to better content moderation.<\/p>\n<p>Moving along, we look at how fraudsters are <em>still<\/em> using verified Twitter accounts to scam people out of cryptocurrency, with recent estimates showing more than half a million in Bitcoin has been stolen so far.<\/p>\n<p>We wrap up with a Windows 10 flaw as well as a recent study showing that macaques (yes, monkeys) have learned to steal items of high value, which they find are more likely to get them food in exchange. Madness.<\/p>\n<p>If you liked the podcast, please consider subscribing and sharing with your friends. For more information on the stories we covered, see the links below:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.politico.com\/news\/2021\/01\/17\/pelosi-laptop-office-capitol-460147\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">FBI investigating whether woman stole laptop from Pelosi\u2019s office to sell it to Russia<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/verified-twitter-accounts-hacked-in-580k-elon-musk-crypto-scam\/amp\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Verified Twitter accounts hacked in $580k \u2018Elon Musk\u2019 crypto scam<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/women-in-tech-2021\/38470\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Apple\u2019s Tim Cook: Parler could return \u2018if they get their moderation together\u2019<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/windows-10-bug-corrupts-your-hard-drive-on-seeing-this-files-icon\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Windows 10 bug corrupts your hard drive on seeing this file\u2019s icon<\/a><\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/science\/2021\/jan\/14\/balis-thieving-monkeys-seek-bigger-ransoms-for-high-value-swag-study\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Bali\u2019s thieving monkeys can spot high-value items to ransom<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/17621027\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/00a88e\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Jeff and Dave chat about Parler\u2019s resurgence, monkey thieves, and Bitcoin scams on Twitter that use verified accounts.<\/p>\n","protected":false},"author":437,"featured_media":17920,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[14,374,444,695,83],"class_list":{"0":"post-17919","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-apple","9":"tag-bitcoin","10":"tag-podcast","11":"tag-scam","12":"tag-twitter"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-183\/17919\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-183\/22431\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/transatlantic-cable-podcast-183\/24135\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-183\/22210\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-183\/38483\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/transatlantic-cable-podcast-183\/28809\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-183\/28617\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/437"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=17919"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17919\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/17920"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=17919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=17919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=17919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}