An unusual method of stealing data from surveillance cameras
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
73 articles
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
A recent study shows how it’s possible to identify typed text from the sound of keystrokes — even in far-from-ideal environments.
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
Online dating is great for those looking for love – but beware the risks!
Our colleagues conducted a study in which, among other things, they assessed how education in the field of information security relates to a career in that field.
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
Four major studies presented by our experts at the SAS 2023 international conference.
Generation X and Millennials putting themselves at risk online despite knowing the dangers
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
Are you sure your former colleagues don’t have access to corporate data or systems?
Are you giving away more than you realise with your dating profile?
The pandemic changed many things, but an increase in doxing was one that many people didn’t expect.
Black Friday is upon us – but the added complication of Covid is causing some shoppers to take unnecessary risks.
Research seeks to understand key drivers of the future of work.
The Kaspersky Next event looked at human augmentation, Cerberus and hospital hackers
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
Human augmentation, once the preserve of science fiction is quickly entering normal life – how will this change us?
When calculating potential losses from cyberincidents, statistical data is just as important as its interpretations.
A CISO has to spend a lot of time interacting with the business and also needs a team of professionals who can perform highly specialized technical tasks.
What the Hoax verdict means, and why such software is becoming more of a problem.