
Three ways to hack… a mattress!
A security researcher has investigated his own smart mattress cover, discovering several ways to hack it — including through a backdoor preinstalled by the developer.
756 articles
A security researcher has investigated his own smart mattress cover, discovering several ways to hack it — including through a backdoor preinstalled by the developer.
We dive into the mechanics of the controversial nude-scanning app that has mysteriously materialized on a billion phones.
Reasons for updating your ESXi infrastructure ASAP, and enterprise threats that VM escape poses.
We found several groups of sites mimicking official websites of the DeepSeek and Grok chatbots. Fake sites distribute malware under the guise of non-existent chatbot clients for Windows.
What information does an MDR service need to protect a company from complex targeted attacks?
Eight signs your WhatsApp account has been stolen — and steps to recover and protect it.
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
What benefits do hybrid clouds and containerization bring to businesses — and what measurable impact do cybersecurity tools make?
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
What network-security and access-control tools do the world’s top cyber-regulators recommend to companies?
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Hundreds of new gadgets and smart appliances are traditionally unveiled every January at the Consumer Electronics Show in Vegas. How will they affect our cybersecurity?
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
European researchers have discovered a vulnerability in AMD processors that can be exploited by modifying RAM modules.
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
How to estimate what and how much hardware will be needed for a SIEM system to assess the costs before deployment?
The best privacy-focused services that make practical gifts for friends and family.
Kaspersky specialists, in collaboration with external experts, have formulated some key guidelines for safe and legal use of AI.
How a simple, well-known general threat became a key targeted-attack vector on companies.