{"id":14218,"date":"2018-09-06T12:17:25","date_gmt":"2018-09-06T16:17:25","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/?p=14218"},"modified":"2020-12-24T20:58:49","modified_gmt":"2020-12-24T15:28:49","slug":"transatlantic-cable-podcast-53","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-53\/14218\/","title":{"rendered":"Transatlantic Cable podcast, episode 53"},"content":{"rendered":"<p>On this episode of the Transatlantic Cable Podcast from Kaspersky Lab, Dave and I boldly go where this podcast has never gone before \u2014 into the brain of William Shatner. I will always prefer smugglers, swords with lights coming out of them, and Muppets in my space odysseys, but you can\u2019t help but read a story where Captain Kirk expresses his fears of virtual reality. Following that trippy story, we jump into stories looking at data sharing between Google and Mastercard, Colorado upping its data privacy laws, and a hacked Chrome extension. For the full stories we discuss this week, please click the links below.<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.theguardian.com\/culture\/2018\/aug\/31\/a-screaming-nightmare-william-shatner-boldly-goes-into-vr\" rel=\"noopener noreferrer nofollow\">William Shatner boldly goes into VR<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/youtu.be\/YkzhifU3F9I\" rel=\"noopener noreferrer nofollow\">Kaspersky VR video \u2014 enter the HuMachine<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2018-08-30\/google-and-mastercard-cut-a-secret-ad-deal-to-track-retail-sales\" rel=\"noopener noreferrer nofollow\">Google tapping Mastercard data on in-store purchases<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.denverpost.com\/2018\/09\/04\/colorado-businesses-consumer-data-protection-law\/\" rel=\"noopener noreferrer nofollow\">Colorado\u2019s new consumer data protection law among the most demanding in the country<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/mega-chrome-extension-hacked-to-steal-login-credentials-and-cryptocurrency\/\" rel=\"noopener noreferrer nofollow\">MEGA Chrome extension hacked to steal login credentials and cryptocurrency<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/7013560\/height\/90\/theme\/custom\/autoplay\/no\/autonext\/no\/thumbnail\/yes\/preload\/no\/no_addthis\/no\/direction\/backward\/render-playlist\/no\/custom-color\/87A93A\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.in\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.in\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.in\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<p>\u201cCases involving compromised browser extensions are quite common, but ones on a massive scale are dangerous exceptions that can lead to dire consequences,\u201d said Kaspersky Lab security researcher, Alexey Malanov. If you currently use the Mega extension, you need to take the following measures as soon as possible:<\/p>\n<ul>\n<li>Remove the extension and wait for a fixed version to be available through the Chrome Web Store;<\/li>\n<li>Change your credentials on any website you\u2019ve logged in to \u2014 for example, Amazon, Microsoft, Github, or Google. Mega extension users can assume they have been compromised;<\/li>\n<li>Transfer any cryptocurrency funds, including tokens, to another address. Use two-factor authentication for any resources that support it, because in such cases, even if criminals get to your credentials, they won\u2019t be able to compromise your accounts. Hardware wallets for cryptocurrencies can strengthen the protection of funds.If you have authenticated on any \u0441ryptocurrency exchanges (myetherwallet.com, mymonero.com, idex.market), your private keys have been compromised.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This edition of the Kaspersky Lab podcast looks at Google and Mastercard sharing data, a hacked Chrome extension, and some thoughts from Captain Kirk.<\/p>\n","protected":false},"author":636,"featured_media":14219,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1855,2196],"tags":[1252,16,1470,22,1427,453],"class_list":{"0":"post-14218","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"category-threats","10":"tag-browsers","11":"tag-chrome","12":"tag-extensions","13":"tag-google","14":"tag-mastercard","15":"tag-podcast"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-53\/14218\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-53\/11914\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/transatlantic-cable-podcast-53\/16198\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-53\/14412\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-53\/23793\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/transatlantic-cable-podcast-53\/21081\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-53\/21085\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/14218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=14218"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/14218\/revisions"}],"predecessor-version":[{"id":22350,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/14218\/revisions\/22350"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/14219"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=14218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=14218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=14218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}