Is your TV box renting out your network?
Are you sure your Android TV box is secure? Cutting corners on streaming subscriptions could turn your device into part of a botnet, leave your IP addresses up for rent, and trigger other serious headaches.
3882 articles
Are you sure your Android TV box is secure? Cutting corners on streaming subscriptions could turn your device into part of a botnet, leave your IP addresses up for rent, and trigger other serious headaches.
High-level strategies for locking down popular AI tools that are either unneeded or outright banned under corporate policy.
Why subscription owners need to prioritize personal and family cybersecurity.
How we use Kaspersky Container Security at Kaspersky, and why it’s much more than just an image scanner to us.
Attempts at hijacking AI resources are now taking place on an industrial scale. How is AI infrastructure being targeted, and what defensive measures should you implement?
We regularly create new SIEM rules, but behind the scenes lies a more fundamental process —the evolution of the correlation rules themselves.
We’ve revisited our study on the crackability of real-world passwords leaked on the dark web — originally conducted two years ago. The findings are sobering: nearly every other password can be cracked in under a minute, and three out of five take less than an hour. How can we move away from insecure passwords?
The new VoidStealer Trojan utilizes a novel method to bypass Chrome’s App-Bound Encryption, allowing it to hijack sessions and steal user data.
A targeted supply chain attack via popular software for mounting disk images.
How and why droids from a galaxy far, far away switch their allegiances.
How law enforcement and intelligence agencies leverage data from connected vehicles, and what your car might be leaking about you.
Building a functional app without programming skills is now a possibility, but maintaining it and ensuring cybersecurity remains a challenge. Here are several protective measures that even non-technical creators can implement.
We’ve discovered over two dozen phishing apps mimicking popular crypto wallets right in the official App Store. Here’s a breakdown of the new waves of attacks targeting iPhone and Mac users and their crypto holdings.
Researchers have established that fiber-optic cables can be exploited for eavesdropping. We’re breaking down how feasible such an attack is in a real-world scenario.
As tax-return season rolls around, cybercriminals worldwide are shifting into high gear. They peddle fraudulent services, spoof official tax agency websites, and drain the bank accounts of unsuspecting taxpayers. Here’s how to spot phishing attempts and scams, along with tips for handling your tax documents securely
We’re breaking down why developers have moved into the crosshairs, the specific tactics attackers are using, and how to reduce the risks of company infrastructure being compromised.
The emergence of DarkSword and Coruna — new malware targeting iOS — shows exactly how government intelligence tools are being repurposed as weapons for cybercriminals. We break down how these attacks work, why they’re so dangerous, and what you can do to not get infected.
We’re diving into how the Be My Eyes app helps blind and low-vision users, checking if it’s actually effective at spotting cyberthreats, and sharing essential safety tips for the visually impaired community.
GDDRHammer, GeForge, and GPUBreach: three new research papers diving into attacks that exploit the Rowhammer technique.
Smart sex toys and their companion apps collect and process some extremely personal data. We break down the risks involved, and ways to protect your privacy.
How the AirSnitch vulnerability family threatens corporate networks, and what changes you need to make to your network architecture and settings to stay protected.