In defense of the IoT: First-hand experience
The day I turned home network defender and stopped making fun of IoT developers.
8 articles
The day I turned home network defender and stopped making fun of IoT developers.
Even if you are really not an interesting target for an APT actor, you can still be used in a malware delivery chain
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
At this year’s Security Analyst Summit, Inbar Raz revealed how he managed to crack a cafe chain’s loyalty card system, a taxi service, and an airport
Internet of things is not getting any safer: Our experts analyzed a smart camera and found numerous vulnerabilities.
Yachts are now Internet-friendly — and vulnerable because developers aren’t focusing on information security.
Experts from Kaspersky Lab studied digital evidence related to the hacking attack on the 2018 Olympics in search of the actual attacker.
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company