Transatlantic Cable podcast, episode 140
Dave and Jeff talk about the UK government considering the use of artificial intelligence for espionage, Google’s continued fight against COVID-19 phishing, and more Zoom headaches.
3983 articles
Dave and Jeff talk about the UK government considering the use of artificial intelligence for espionage, Google’s continued fight against COVID-19 phishing, and more Zoom headaches.
Tools and approaches to help you get some online privacy.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
In this episode, Dave and Jeff discuss the amount of scam e-mails tied to COVID-19, Facebook’s disinformation, working remotely, and more.
On its 50th anniversary, we contemplate how Earth Day is becoming more digital.
MITRE tested our solutions in the APT29 evaluation. We explain what the test is, why and how it’s conducted, and what the results mean.
Is your Wi-Fi a bit wobbly? Here are some easy tips to overcome the problem.
Did you have a chance to train your employees in the basics of information security before sending them off to work from home?
How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them.
Dave and Jeff sit down with Eugene Kaspersky to discuss life in the new “normal,” travel, running a company during COVID-19 times, and more.
Using services and programs that IT doesn’t know about causes problems. We explain how to avoid them.
Researchers found a way to create fake fingerprints to fool many devices, although it took a lot of effort.
We explain how to hide private data in images properly, without making rookie mistakes.
When it comes to information security, we’re seeing the same mistakes over and over again.
Dave and Jeff discuss privacy with Marco Preuss, the latest on Zoom, burning 5G down in the UK, and more.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
Ten smart mobile games and educational apps for your child to enjoy and benefit from.
While auditing Web applications, our experts found a vulnerability to enumeration attacks. Here is a description of the problem and how to combat it.