Securing embedded devices in 2025
Identifying threats to embedded devices, and how the updated Kaspersky Embedded Systems Security can help in tackling them?
987 articles
Identifying threats to embedded devices, and how the updated Kaspersky Embedded Systems Security can help in tackling them?
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
Features of embedded systems and suitable protection methods for them.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
An in-depth analysis of CVE-2026-3102, a vulnerability posing a potential threat to anyone processing images on a Mac.
Today we’re diving into the OpenClaw AI agent — formerly known as “Clawdbot” and then “Moltbot” — to prove once again that secure AI is still a long way off.
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?
We break down a new scam that leverages Telegram Mini Apps, and explain how to avoid taking the bait.
How automation turns legitimate tools into a channel for malware delivery.
Researchers have discovered how to connect to someone else’s dashcam in a matter of seconds, and weaponize it for future attacks.
Pixnapping is an Android vulnerability discovered by researchers that allows apps to steal passwords, one-time codes, and other confidential information from the screen without any special permissions from the operating system. How does it work, and what can you do to protect yourself?
The differences between an MXDR service for a large enterprise, and one that would fit perfectly into the security framework of a growing SMB.
How AI-generated code is changing cybersecurity — and what developers and “vibe coders” should expect.
A close look at attacks on LLMs: from ChatGPT and Claude to Copilot and other AI-assistants that power popular apps.
We explain how cyberattackers intercept cookies, the role of the session ID, and how to keep your cookies from going over to the dark side.
We look at how AI can help you plan your vacation — and what can go wrong.
A curious case of spear-phishing email techniques employed on a mass scale.
Scammers have figured out how to send text messages that actually bypass cellular networks. How does illicit “SMS blasting” work, why does it matter for travelers, and how to stay safe.
How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.