
How to secure your smart home
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
14 articles
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Cybercriminals employing office cleaners to gain access into companies, the city of Racine hit with ransomware, Kaspersky SAS, the latest headaches for Twitter, and more.
Dave and Jeff discuss a Facebook bug, DDoS attacks, 5G, Russian hackers, and more.
Fileless malware infects workstations and servers in corporate networks.
Password-based love? Sites that ban humans? In this post, we look at five fun and slightly bizarre projects to get you thinking about security.
The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.
The future doesn’t have to be a dystopian Internet of Things. We just have to prepare.
The real scale of the Yahoo breach (spoiler: 3 billion), Facebook’s own Face ID, UK Lottery DDoS, and more.
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include PCs, smartphones,
Perhaps the most striking point about last week’s huge DDoS attack, which took down more than 80 big websites and online services, is that the criminals behind the attack accomplished
Vitaly Kamluk has more than 10 years of work experience in IT security, and now he is Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer