
In defense of the IoT: First-hand experience
The day I turned home network defender and stopped making fun of IoT developers.
449 articles
The day I turned home network defender and stopped making fun of IoT developers.
Evgeny Chereshnev, professional cyborg, talks about fascinating new jobs that will emerge in the near future.
If you own an Apple device, spend a few minutes setting up your System Location Services. You’ll protect your privacy and lengthen battery life.
Since you started to connect all those Things to the Internet, creating IoT, your home is no longer your fortress by design. Now attackers can spy on your kid through a baby monitor or break into your house by fooling your ‘smart’ security lock.
I was repeatedly asked the question: “Once you decide to become a cyborg, how would your current routine change?” Today I’m going to give you 10 answers to this question.
The world of ubiquitous connected devices is almost here, and it’s so eagerly anticipated that it becoming a reality seems inevitable. Anticipation, however, doesn’t necessarily mean that we are going
There is a flood of appliances which could be connected – and some are connected – without a second thought as to whether or not it’s necessary or secure.
Have you ever wondered how a typical office would look in a decade or so? Allow us to take you on a small tour of the most interesting office concepts.
Kaspersky Lab has just released its forecast of digital realities for 2045. Big changes are anticipated for the entire IT world and businesses. Security challenges will change as well.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
New analysis pinpoints some weaknesses in a new generation of cars with online capabilities. If exploited, this may result in car theft and other problems.
This article is in reaction to the news that a new worm targeted specific models of Linksys routers. The Moon worm ([1], [2]) is exploiting a flaw of those routers’
The Internet of Things is the latest term used to define all kinds of consumer electronics connected to the Internet – from refrigerators and washing machines to irons. Just like
Stefan Tanase, Kaspersky Lab’s Senior Security Researcher, Global Research & Analysis Team, answers users’ questions about social networks, malware and everything in between. There is a saying: “information is power”
Computers have advanced in the last 20 years from building-sized mainframes to smartphones that can fit in your pocket (and have become infinitely more capable, to boot), yet we use
Newly discovered vulnerabilities in AirPlay allow attacks on Apple devices and other AirPlay-enabled products over Wi-Fi – including zero-click exploits.
A year after its disastrous announcement, Microsoft is finally launching its AI-powered Recall feature on Copilot+ PCs. Is the new version secure, and what’s actually changed?
A popular blogger’s Instagram account was hijacked using a SIM-swap attack, and deepfakes were generated to scam followers.
A dozen short and simple tips on how to use WhatsApp, Telegram, Signal, iMessage, WeChat, and other messaging apps safely and hassle-free.