Transatlantic Cable podcast, episode 312
From uncovering cybercriminal tactics to AI hiring tools, HR chatbots, and the UK Electoral Commission’s cyberattack on voter this is Kaspersky Podcast.
833 articles
From uncovering cybercriminal tactics to AI hiring tools, HR chatbots, and the UK Electoral Commission’s cyberattack on voter this is Kaspersky Podcast.
Detailed tips for those who want to make money from streaming without feeding the trolls.
It means that some companies still have not installed MS Office patches that were published 5 years ago.
Four threats you might face when using Airbnb, and tips for avoiding them.
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
What two-factor authentication types are out there, and which ones should be preferred.
A few tips on how to establish cybersecurity communications with employees.
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.
How scammers can hack your YouTube channel without knowing a password and second factor.
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
What multi-factor authentication is, why you should use it, and what “factors” there are.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Сloud technologies differ in terms of both costs and risks. What cloud type should you choose, and how should you begin your migration?