Ecovacs robot vacuums get hacked
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
323 articles
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Scammers have invented a new trick — they post cryptowallet seed phrases in YouTube comments using newly created accounts. Here’s how it works
How a simple, well-known general threat became a key targeted-attack vector on companies.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
Scammers posing as buyers snatch one-time codes during online product demos.
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
A detailed guide on setting up privacy in the adidas Running app.
We share our experience on the optimal use of AI models in the SOC of our Kaspersky MDR service.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.
This guide will walk you through the essential privacy settings in the Nike Run Club training app.
Phishers have adopted another trick: they send emails pretending to be from Docusign with a fake link to a document that the recipient must sign.
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
Running apps know a lot about their users, so it’s worth setting them up to ensure your data doesn’t fall into the wrong hands. Here’s how.
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
Why cybersecurity in education is critical, and how to protect schools from attacks.
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.