Securing embedded devices in 2025
Identifying threats to embedded devices, and how the updated Kaspersky Embedded Systems Security can help in tackling them?
612 articles
Identifying threats to embedded devices, and how the updated Kaspersky Embedded Systems Security can help in tackling them?
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
Features of embedded systems and suitable protection methods for them.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
How and why droids from a galaxy far, far away switch their allegiances.
Building a functional app without programming skills is now a possibility, but maintaining it and ensuring cybersecurity remains a challenge. Here are several protective measures that even non-technical creators can implement.
We’ve discovered over two dozen phishing apps mimicking popular crypto wallets right in the official App Store. Here’s a breakdown of the new waves of attacks targeting iPhone and Mac users and their crypto holdings.
The emergence of DarkSword and Coruna — new malware targeting iOS — shows exactly how government intelligence tools are being repurposed as weapons for cybercriminals. We break down how these attacks work, why they’re so dangerous, and what you can do to not get infected.
Telehealth services and apps are blowing up in popularity right now, making the availability of medical services better than ever. But just how safe is telemedicine, and what kind of risks does it carry?
How to manage vulnerabilities when developing or using open-source software.
How the AI boom and increasing reliance on open-source components are piling up corporate security debt — and what you can actually do about it.
Spammers have figured out how to hide links to fraudulent sites within surveys created on legitimate platforms. We’re breaking down the ruse and sharing tips on how to avoid falling for it.
How open-source security solutions became the starting point for a massive attack on other popular applications, and what organizations that use them should do.
An in-depth analysis of CVE-2026-3102, a vulnerability posing a potential threat to anyone processing images on a Mac.
Today we’re diving into the OpenClaw AI agent — formerly known as “Clawdbot” and then “Moltbot” — to prove once again that secure AI is still a long way off.
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?
We break down a new scam that leverages Telegram Mini Apps, and explain how to avoid taking the bait.
How automation turns legitimate tools into a channel for malware delivery.
Researchers have discovered how to connect to someone else’s dashcam in a matter of seconds, and weaponize it for future attacks.