Hacking electricity, water, and food
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
239 articles
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Hacked medical equipment can cost patients a lot — their health or even their lives.
This tiny device will help you protect your smartphone from malware and data leakage when charging in public places.
A vulnerability affecting all versions of Windows since Windows 2000 through Windows 10 might have been discovered. It’s still uncertain, however.
The late April was especially “rich” with news related to bugs, attacks and Android-targeting malware.
A 10-year old from Finland successfully discovered and reported an Instagram flaw, and was handsomely rewarded by Facebook.
A new strain of ransomware targets servers which is, mildly put, a troubling development.
A massive flaw in transport layer security (TLS) protocol was discovered and it leaves millions vulnerable to an attack that could expose financial data and more.
Shodan and Censys are the search engines for the Internet of Things and this duo is capable of wreaking havoc in a lot of different ways
Ships have their own black boxes but their security leaves much to be desired
Konstantin Goncharov recaps the most significant security events of 2015.
Passwords are a sensitive subject for the majority of Internet users. Let’s clarify, what are the right and wrong ways to use passwords?
Did you know that your PC can become infected by an email that you never actually read?
A renovated version of TeslaCrypt ransomware has recently affected numerous devices in Japan and Nordic countries.
Kaspersky Lab has recently conducted an unusual research and proved that many users hardly care about security. Here is the reason to create reliable passwords for all of your accounts.
Cellular networks are not that hard to hack and it is almost impossible to protect them. Telcos are not ready to take responsibility and spend millions of dollars to secure their clients.
Since you started to connect all those Things to the Internet, creating IoT, your home is no longer your fortress by design. Now attackers can spy on your kid through a baby monitor or break into your house by fooling your ‘smart’ security lock.
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
Google’s Android OS is a vulnerable system. Developers make it worse by not providing critical patches in time.
A recent study of attitudes toward information risk shows that one in four (24%) IT specialists are concerned about the growing complexity of IT infrastructures and see this trend as a threat to security.