{"id":19680,"date":"2022-05-20T12:46:30","date_gmt":"2022-05-20T08:46:30","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-251\/19680\/"},"modified":"2022-05-20T12:46:30","modified_gmt":"2022-05-20T08:46:30","slug":"transatlantic-cable-podcast-251","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-251\/19680\/","title":{"rendered":"Transatlantic Cable podcast, episode 251"},"content":{"rendered":"<p>Welcome to episode 251 of the Transatlantic Cable. This week, the team look at some of the more \u2018interesting\u2019 stories in the cybersecurity world.<\/p>\n<p>To kick off this week\u2019s episode, the team look at a recent story suggesting that San Francisco Police are looking at ways to leverage the \u2018always recording\u2019 feature of driverless cars to their advantage \u2013 including for investigation leads. From there, the team discuss a recent blog looking at modern warfare, in particular how most military devices today are connected to the internet \u2013 is that a risk?<\/p>\n<p>Moving on, the trio dissect a recent story looking at how malware could be uploaded to an iPhone whilst it\u2019s powered off \u2013 however, there\u2019s a caveat with the story that takes a little of the sting out of it. To wrap up, they look at recent research from Kaspersky around the shape of ransomware and how it\u2019s perceived by business executives.<\/p>\n<p>If you like what you heard, please do consider subscribing.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.vice.com\/en\/article\/v7dw8x\/san-francisco-police-are-using-driverless-cars-as-mobile-surveillance-cameras\" target=\"_blank\" rel=\"noopener nofollow\">San Francisco Police Are Using Driverless Cars as Mobile Surveillance Cameras<\/a><\/li>\n<li><a href=\"https:\/\/www.brookings.edu\/techstream\/hacked-drones-and-busted-logistics-are-the-cyber-future-of-warfare\/\" target=\"_blank\" rel=\"noopener nofollow\">Hacked drones and busted logistics are the cyber future of warfare<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/05\/researchers-devise-iphone-malware-that-runs-even-when-device-is-turned-off\/\" target=\"_blank\" rel=\"noopener nofollow\">Researchers devise iPhone malware that runs even when device is turned off<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/anti-ransomware-day-report\/\" target=\"_blank\" rel=\"noopener nofollow\">Ransomware is much more than just a buzzword<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/23164313\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/87A93A\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>This week\u2019s episode includes iPhone hacks, drone hacks, driverless car surveillance and ransomware. Tune in!<\/p>\n","protected":false},"author":437,"featured_media":19681,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[444],"class_list":{"0":"post-19680","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-podcast"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-251\/19680\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-251\/24198\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/transatlantic-cable-podcast-251\/26523\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-251\/24479\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-251\/44396\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/transatlantic-cable-podcast-251\/30561\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-251\/30310\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/437"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19680"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19680\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19681"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}