
Trojan embedded in fake Android smartphones
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
970 articles
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
Features of embedded systems and suitable protection methods for them.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.
This marks the second time we’ve found a stealer Trojan in the App Store.
We’ve launched the Kaspersky eSIM Store — an easy way to buy and activate eSIM cards, giving you instant cellular internet access in over 150 countries and regions worldwide.
Researchers find 57 potentially dangerous browser extensions in the Chrome Web Store. Here’s why they’re dangerous, and how not to fall victim.
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
Businesses reaching the “acceptance stage”: given inevitable breaches — how to prepare for them?
Why highlighted links to visited sites can be dangerous, and why a solution was over 20 years in the making.
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
Episode 365 has chatbots, CAPTCHA, Trump and yet more GDPR woes!
Episode 364 has Tamagotchi’s, is TOR broken and crazy robot shenanigans!
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
Episode 363 has brain rot, stolen mobiles in China and streaming fraud!