
In defense of the IoT: First-hand experience
The day I turned home network defender and stopped making fun of IoT developers.
99 articles
The day I turned home network defender and stopped making fun of IoT developers.
At MWC 2018, Kaspersky Lab researchers show how easily a smart home can be hacked.
A vivid example of why we need to strengthen IoT security — and a solution to the problem.
Xiaomi’s robotic vacuum cleaner was hacked by security researchers. However, it proved much more secure than most other smart devices.
In this week’s Kaspersky Lab’s podcast, Dave and Jeff take a stab at New Year’s resolutions, with an IT security twist.
In this week’s edition Kaspersky Lab’s podcast, Dave and Jeff look at hackable heating, using Twitter to predict traffic jams and how to stop the spread of fake news.
ENISA has published recommendations for information security for IoT devices deployed within critical infrastructure facilities
In this week’s edition Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss the company’s security predictions for 2018.
A new study by Kaspersky Lab showed how insecure smart devices really are. We explain how to cope.
In today’s Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss Germany destroying smartwatches, Detroit community Wi-Fi and hacked cars.
In this week’s edition of Kaspersky Lab’s Transatlantic Cable podcast, we discuss IoT security in toys for children and adults.
The future doesn’t have to be a dystopian Internet of Things. We just have to prepare.
This week’s Transatlantic Cable podcast dishes on pizza, unsafe kids smartwatches, and more.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
We’ve written a bunch about the insecurity of the Internet of Things (IoT) and connected devices. Many have also wondered how secure voice-controlled home devices like Google Home, Alexa, and
For several years the biggest smartphone developer, Samsung, has been heavily promoting the Tizen operating system. This experiment began in 2013, when the market saw two new Samsung cameras that
Last week, a coworker shared an interesting article with me from the BBC. It reported that Germans were being told to destroy a connected children’s toy because of hacking concerns.
Perhaps the most striking point about last week’s huge DDoS attack, which took down more than 80 big websites and online services, is that the criminals behind the attack accomplished
When a product is built, the manufacturer typically has a lifecycle in mind in regards to how long a consumer will ideally use the device. For example smartphones are something
Look around — we are living in the Internet of Things. In our day-to-day life, we encounter things connected to the Internet, starting with our home Wi-Fi routers and leading