Transatlantic Cable podcast, episode 224
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss a school using facial recognition for kids’ lunch payments, REvil being hacked again, more than $600 million in ransom payments, and more.
898 articles
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss a school using facial recognition for kids’ lunch payments, REvil being hacked again, more than $600 million in ransom payments, and more.
How attackers are most apt to get into target companies’ infrastructure.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Guard against ransomers who encrypt your files and demand payment for their safe return.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss a breach at T-Mobile, John Oliver’s rant on ransomware, garbage trucks finding Wi-Fi, and more.
Cybercriminals are offering ban-as-a-service for blocking Instagram users.
Why using a corporate mail account for personal matters is not a good idea
Received a confirmation e-mail for a purchase you didn’t make with a phone number to contact the company? Beware, it’s vishing.
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
In computer games, where does the money go — and what can you do about it?
Cybersecurity on a budget Security for your small business — fast and cheap or at no cost at all — in a 5-minute read Go to personal recommendations Take our quiz
Scammers pretend to represent brands on Twitter and lure customers onto phishing websites. Here’s how to avoid it.
Spammers are using malicious macros to distribute IcedID and Qbot banking malware in seemingly important documents.
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
How ontologies can provide the world with greater, faster protection from cyberthreats and more.
How to protect your clients from cybercriminals impersonating your company on Twitter.
Many companies throw out information that can pose a security or reputational risk.