
Trojan embedded in fake Android smartphones
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
975 articles
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
Features of embedded systems and suitable protection methods for them.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
A close look at attacks on LLMs: from ChatGPT and Claude to Copilot and other AI-assistants that power popular apps.
We explain how cyberattackers intercept cookies, the role of the session ID, and how to keep your cookies from going over to the dark side.
We look at how AI can help you plan your vacation — and what can go wrong.
A curious case of spear-phishing email techniques employed on a mass scale.
Scammers have figured out how to send text messages that actually bypass cellular networks. How does illicit “SMS blasting” work, why does it matter for travelers, and how to stay safe.
How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.
This marks the second time we’ve found a stealer Trojan in the App Store.
We’ve launched the Kaspersky eSIM Store — an easy way to buy and activate eSIM cards, giving you instant cellular internet access in over 150 countries and regions worldwide.
Researchers find 57 potentially dangerous browser extensions in the Chrome Web Store. Here’s why they’re dangerous, and how not to fall victim.
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
Businesses reaching the “acceptance stage”: given inevitable breaches — how to prepare for them?
Why highlighted links to visited sites can be dangerous, and why a solution was over 20 years in the making.
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.