Farm equipment security at DEF CON 29
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
1147 articles
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
How attackers are most apt to get into target companies’ infrastructure.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Airports have always been an attractive target for cybercrime. Here’s how to keep them protected.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
To protect MikroTik routers from the Mēris botnet, or to clean a previously infected router, users should update RouterOS and check settings.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss a fake press release that led to a spike in Litecoin, a data breach at McDonald’s, and more.
This week on the Kaspersky podcast, Ahmed and Jeff discuss Apple’s decision to hold off on CSAM, Babuk’s source code being leaked, a fake Banksy NFT, and more.
Smart devices are easy targets for cybercriminals. Here’s how to protect your smart vacuum cleaner, air conditioner and other connected devices.
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
Guard against ransomers who encrypt your files and demand payment for their safe return.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
One click on a phishing link can cost a company both money and reputation. Here’s how to protect your company from phishing.
Cybercriminals are offering ban-as-a-service for blocking Instagram users.
Public Wi-Fi is handy, but it’s not always safe. We demystify cybercriminal techniques and teach you how to stay at least one step ahead.