
How to hack a bicycle
Researchers have discovered several potential attack vectors targeting bicycles fitted with Shimano Di2 wireless gear-shifting system.
206 articles
Researchers have discovered several potential attack vectors targeting bicycles fitted with Shimano Di2 wireless gear-shifting system.
How to protect the less obvious parts of your IT infrastructure (and from what) — from printers and video surveillance kit to insulin pumps.
A new vulnerability allows remote attackers to gain root privileges on Linux servers. How easy is it for CVE-2024-6387 to be exploited – and how to prevent it
Kaspersky ICS-CERT experts have discovered several critical vulnerabilities in Telit Cinterion M2M modems, which are used in millions of devices.
Hackers have long been engaging with the gaming world: from cracking games and creating cheats, to, more recently, attacking esports players live during an Apex Legends tournament. Regarding the latter, we break down what happened and how it could have been avoided.
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
Security companies offer smart technologies — primarily cameras — to protect your home from burglary, fire and other incidents. But what about protecting these security systems themselves from intruders? We fill this gap.
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Cybersecurity trends to consider and new threats to protect against in 2024.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
We explore some common misconceptions about the development and application of Cyber Immune products based on KasperskyOS.
This report examines which apps kids spend most time on, and what specifically caught their interest this summer (June through August 2023).
A new school year, and a familiar headache for parents: kids’ cybersecurity. In this first post, we discuss how to protect your children’s gadgets from cyberthreats.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
Why such OSs are gaining more significance in markets in need of security.
In its February update, Microsoft buried Internet Explorer once and for all. Or did it? We investigate what really happened.
Better put them on something not very valuable or necessary. Here we explain why.
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
Chances are your home already contains a few smart components. But can you make them even smarter so as to reap yet more benefits from them?