How to snoop on Apple Vision Pro user passwords
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
161 articles
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
We’ve discovered a new Trojan that’s very selective about its victims.
Researchers have discovered several potential attack vectors targeting bicycles fitted with Shimano Di2 wireless gear-shifting system.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Fraudsters are using AI-generated digital clones to bypass Know Your Customer (KYC) procedures and open money laundering accounts.
Kaspersky NEXT 2024 in Athens brought together experts to tackle the challenges of AI and deepfakes, highlighting the importance of collaboration, education, and innovative detection technologies.
The exact location of your router is publicly available through global Wi-Fi geolocation databases. Let’s explore why this is necessary, and the risks it entails and how to mitigate them.
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
Vehicle makers sell the data collected by connected cars about their users’ driving habits to data brokers – who resell it to insurance companies.
Researchers have learned to recognize the positions and poses of people indoors using Wi-Fi signals. To do this, they used ordinary home routers and machine learning.
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
Generative AI is now a common tool for many, but should business leaders be concerned?
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.
It’s obvious already that AI needs regulating, but how? Here’s Eugene Kaspersky telling us how he sees it.