
Xiaomi Mi Robot vacuum cleaner hacked
Xiaomi’s robotic vacuum cleaner was hacked by security researchers. However, it proved much more secure than most other smart devices.
61 articles
Xiaomi’s robotic vacuum cleaner was hacked by security researchers. However, it proved much more secure than most other smart devices.
The largest motor show in the world is the best place to see what cars will look like in the near future.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
It turns out there are bots in Tinder and OkCupid. Who wants that?
Samsung releases more and more devices with Tizen OS. At SAS 2017, we found out that this OS is highly insecure.
There’s been a lot of talk lately about privacy protection and VPNs. But what exactly is a VPN? We explain in simple words.
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
Ransomware research shows that paying ransom is no guarantee you’ll get your files back.
Security researchers claim that they have managed to remotely hack an unmodified Tesla Model S with the latest firmware installed.
Up close and personal, one Kaspersky Labs editor’s experience with the system failure at Delta Air Lines.
Charlie Miller and Chris Valasek learned to hack a car’s steering wheel, brakes, and acceleration. They presented their finding at Black Hat USA 2016.
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
Criminals behind the ATM Infector campaign are turning ATMs into invisible skimmers.
The big hunt begins: hackers are eager to make their buck before every merchant in US moves to chip-and-pin cards
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
Researchers expose how a criminal can hack air conditioners to crash the power grid.