
A robot’s ransom
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
3281 articles
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
There are simply not enough skilled professionals to meet everyone’s security needs
In this podcast, Jeff and Dave discuss the Facebook and Cambridge Analytica debacle, hackers making bomb threats, and more.
At this year’s Security Analyst Summit, Inbar Raz revealed how he managed to crack a cafe chain’s loyalty card system, a taxi service, and an airport
Almost every new smartphone now lets you unlock it with your face — and that’s really bad for security.
Jeff sits down with Thiago Marques and Santiago Pontiroli to discuss their talk at #TheSAS2018 on Prilex and the carding scene in Brazil.
Yachts are now Internet-friendly — and vulnerable because developers aren’t focusing on information security.
In this podcast, Jeff and Dave discuss Fortnite accounts being compromised, Bitcoin mining in rural America, porn-themed crypto currency and more.
Solar power and wind energy could one day replace oil and gas.
One of the most sophisticated APT campaigns ever analyzed by our experts.
In today’s podcast, Jeff sits down with Santiago Pontiroli from Kaspersky Lab’s GReAT to discuss the happenings of the second day of the SAS 2016.
Experts from Kaspersky Lab studied digital evidence related to the hacking attack on the 2018 Olympics in search of the actual attacker.
On this podcast, Jeff sits down with Thiago Marques and Santiago Pontiroli to recap the first day of #TheSAS2018.
An expedition to the North Pole celebrates women’s rights and gender equality
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
Kaspersky Lab is expanding its successful bug bounty program to include rewards of up to $100,000.
In this podcast, Jeff and Dave discuss the upcoming Security Analyst Summit, this year being held in Cancún.
Harmless toy or a way to phish for personal data?
Avoid the phishing bait and protect your Telegram account
Security experts highlight potential entry points into healthcare networks and describe relevant cyberthreats
Two new fingerprint-scanning technologies revealed at Mobile World Congress 2018 use different approaches.