
ICS and IoT – A Special Podcast Series (Ep. 1)
In this special edition of the Kaspersky Transatlantic Cable Podcast, we dive into the world of critical infrastructure with the Kaspersky ICS team.
211 articles
In this special edition of the Kaspersky Transatlantic Cable Podcast, we dive into the world of critical infrastructure with the Kaspersky ICS team.
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
Our experts tried to hack six smart gadgets for cars to find out how manufacturers protect customers.
Are the IoT’s security issues placing the industry on the road to a litigation nightmare?
The day I turned home network defender and stopped making fun of IoT developers.
A vivid example of why we need to strengthen IoT security — and a solution to the problem.
ENISA has published recommendations for information security for IoT devices deployed within critical infrastructure facilities
The Internet of Things is vulnerable like nothing else. What should you do to secure your smart home and other devices on the home network?
Who is responsible when connected devices go on a crime spree?
Manufacturers need to change their mindset when it comes to the IoT
Since you started to connect all those Things to the Internet, creating IoT, your home is no longer your fortress by design. Now attackers can spy on your kid through a baby monitor or break into your house by fooling your ‘smart’ security lock.
How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.
Malicious actors are busy setting up fake Netflix websites, trying to trick visitors into paying for supposedly legitimate subscriptions, and promising in-game currency and skins for popular games. How else are they scamming Gen Zers, and what can we do to fight back?
This report delves into the cyberthreat landscape that has exploited Gen Z’s favorite games from Q2 2024 to Q1 2025, highlighting the related dangers and providing insights on how to protect yourself from these threats.
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
Fending off ransomware attacks that exploit corporate IoT devices.
If you’ve ever downloaded game cheats from a YouTuber’s “link in the description”, your computer might be infected with a stealer.
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.