Lumos: IoT device detection system
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
2890 articles
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
One of the most complex, yet easy to understand, infosec studies of recent times.
How scammers lure YouTube users to a fake website where a purported bug lets them exchange Bitcoin at an excellent rate.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Episode 257 of the Kaspersky podcast includes hacking ships and planes, lost USB sticks in Japan and Instagram selfie age checks!
How cybercriminals extract bank card details pretending to be DHL.
Why the future belongs to neuromorphic processors, and how they differ from conventional processors in modern devices.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Deep analysis of modern ransomware allows you to implement universal methods to counter them.
From Metal Gear Solid 2 to “BidenCash” and NFTs, it’s episode 256 of the Transatlantic Cable!
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
How an intern can be a threat to your organization’s cybersecurity and what you can do about it.
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.
Meet Valter Generoso, Technical Account Manager at Kaspersky Latin America.
Our experts studied the shadow market for initial access to corporate infrastructure.
From possible sentient AI to leaky stalkerware and digital doubles – it’s episode 255 of the Transatlantic Cable!
Kaspersky Managed Detection and Response experts identified the adversarial techniques that were most prevalent cybersecurity incidents in 2021.
For this edition of the Kaspersky podcast, Ahmed, Jag and Jeff discuss an app that allows employees to rate colleagues, Bored Ape compromised, Elon’s Twitter spat and more.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.