Securing embedded devices in 2025
Identifying threats to embedded devices, and how the updated Kaspersky Embedded Systems Security can help in tackling them?
982 articles
Identifying threats to embedded devices, and how the updated Kaspersky Embedded Systems Security can help in tackling them?
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
Features of embedded systems and suitable protection methods for them.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
We break down a new scam that leverages Telegram Mini Apps, and explain how to avoid taking the bait.
How automation turns legitimate tools into a channel for malware delivery.
Researchers have discovered how to connect to someone else’s dashcam in a matter of seconds, and weaponize it for future attacks.
Pixnapping is an Android vulnerability discovered by researchers that allows apps to steal passwords, one-time codes, and other confidential information from the screen without any special permissions from the operating system. How does it work, and what can you do to protect yourself?
The differences between an MXDR service for a large enterprise, and one that would fit perfectly into the security framework of a growing SMB.
How AI-generated code is changing cybersecurity — and what developers and “vibe coders” should expect.
A close look at attacks on LLMs: from ChatGPT and Claude to Copilot and other AI-assistants that power popular apps.
We explain how cyberattackers intercept cookies, the role of the session ID, and how to keep your cookies from going over to the dark side.
We look at how AI can help you plan your vacation — and what can go wrong.
A curious case of spear-phishing email techniques employed on a mass scale.
Scammers have figured out how to send text messages that actually bypass cellular networks. How does illicit “SMS blasting” work, why does it matter for travelers, and how to stay safe.
How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.
This marks the second time we’ve found a stealer Trojan in the App Store.
We’ve launched the Kaspersky eSIM Store — an easy way to buy and activate eSIM cards, giving you instant cellular internet access in over 150 countries and regions worldwide.
Researchers find 57 potentially dangerous browser extensions in the Chrome Web Store. Here’s why they’re dangerous, and how not to fall victim.
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
Businesses reaching the “acceptance stage”: given inevitable breaches — how to prepare for them?